You have been using your Microsoft cordless mouse for a year but it suddenly stopped
working. You did not install the mouse software (driver) from Microsoft when you got the
mouse because you did not care about using custom features. You have been using the
generic mouse software for Windows. List all of the troubleshooting steps you would do
before declaring that the mouse is defective.

Answers

Answer 1

A wireless mouse can be very portable and effective in our day-to-day work on the computer but can develop problems. one of the problems you might come across is that it suddenly stops working. this can be caused by either a software or hardware issue.

What are the possible issues?Possible software issuesCorrupt drivers Faulty operating system

Possible hardware issues:

Weak batteryFaulty dongleFaulty USB portsFaulty components on the mouse panel

Below are a list of troubleshooting steps

Check switchReplace batteryUninstall drivers and reinstallupdate drivers (if any available update)Reinstall OScheck dongleTry on another computer

Learn more about computer on:

https://brainly.com/question/24540334

#SPJ1


Related Questions

least privilege meaning in cybersecurity

Answers

Answer:

It is where each system is designed so that it only has the permissions necessary to operate, nothing more.

Explanation:

This is done for security concerns, which is the whole reason for cybersecurity.

“A military contractor has been asked to produce a new all-terrain tablet PC which will be used by the armed forces when out in combat situations. Cost is not an option, lives could well depend on how reliable this tablet PC is under extreme conditions.

Answers

Storage devices are pieces of hardware used to store large amounts of data. Storage devices such as SD cards and SSD cards can be used in military operations because they are durable, do not break easily, and can store large amounts of data.

What exactly is a storage device?

Storage devices are any type of computing hardware that is used to store, transfer, or extract data. Storage devices can temporarily and permanently hold and store data. They can be either internal or external to a computer.

SD cards are the best device for storing and playing large data files. SSDs, on the other hand, are designed to run a computer's operating system partition.

One device serves a simpler purpose, whereas the other must be smarter and more adaptable. These are the most compatible storage devices for military applications.

Thus, it is reliable this tablet PC is under extreme conditions.

For more details regarding storage devices, visit:

https://brainly.com/question/11599772

#SPJ1

Your question seems incomplete, the probable complete question is:

Read the following scenarios carefully and select a suitable storage device for each situation. Make sure to justify your choice by talking about the characteristics of your chosen storage device such as Capacity, Speed, Portability, Durability and Reliability.

(a) “A military contractor has been asked to produce a new all-terrain tablet PC which will be used by the armed forces when out in combat situations. Cost is not an option, lives could well depend on how reliable this tablet PC is under extreme conditions.”

Please help! AP CSP problem.

Answers

Answer:

a is the correct answer ok

The cpu is the component responsible for commanding which other component in the system?

Answers

The CPU is the component responsible for commanding memory in the system. The correct option is 3.

What is a CPU?

The CPU is instructed on what to do next and how to communicate with other components by the operating system, a sizable program.

As you are aware, there are numerous computer operating systems, including the Microsoft Windows operating system. An operating system is a substantial piece of software that controls your computer and aids the CPU in decision-making. The CPU is controlled by an operating system so that it can communicate with other system components.

Therefore, the correct option is 3. Memory.

To learn more about CPU, refer to the link:

https://brainly.com/question/14671593

#SPJ1

The question is incomplete. Your most probably complete question is given below:

1. CPU

2. bus

3. memory

4. I/O subsystem.

1. Keep the flyer to one page.
2. Be sure the flyer is easy to read and has an attractive design
3. Be sure to provide all information on the flyer as indicated on page 168
4. Use a SmartArt graphic
5. Use a bulleted list
6. Use a picture graphic
7. Choose a color scheme
8. Be creative!

Answers

To quickly and easily create a visual representation of your knowledge, create a SmartArt graphic. You can select from a variety of layouts to clearly convey your message or ideas.

Make a brand-new SmartArt image.

To quickly and easily create a visual representation of your knowledge, create a SmartArt graphic. You can select from a variety of layouts to clearly convey your message or ideas. Excel, Outlook, PowerPoint, and Word all support the creation and use of SmartArt visuals.

See Choose a SmartArt graphic for an overview of SmartArt graphics, including tips for selecting the right visual and layout style to present your data or illustrate a point.

Notes:

Click the arrow control next to the SmartArt graphic to reveal the Text pane if it is not already there.On the Place tab, in the Text group, select Text Box to insert a text box so that you can add text, such as a title, anywhere near or on top of your SmartArt design. Right-click your text box, select Format Shape or Format Text Box, and then choose to make the text box's background and border transparent if you only want the text inside it to show up.

To learn more about SmartArt refer to

https://brainly.com/question/4911152

#SPJ1

common errors in writing Python

Answers

Answer:

1.not following the rules

2.misusing expression

Discuss types of indentation​

Answers

There are three types of indents:
Before text indent: This is also called the left indent. ...
After text indent: This is also called the right indent. ...
First line indent: This option is used to specify indent values for the first line of the document.

what's formatting in computer​

Answers

Answer:

completrly erasing

Explanation:

Reformatting a computer means completely erasing (formatting) the hard drive and reinstalling the operating system and all other applications and files. All of your data on the hard disk will be lost, so you will need to back it up to an External HD, DVD, flashdrive or another computer.

Formatting of computer means erasing something like hard drive disks etc.

Explanation:

Format or document format is the overall layout of a document or spreadsheet. For example, the formatting of text on many English documents.

which country did poker originate from?

Answers

Poque, a game that dates back to 1441 and that was supposedly invented in Strasbourg, seems to be the first early evidence of the French origin of the game. Poque in particular used a 52-card deck

France/French

[SPECIAL]>>>WRITE THIS TEXT IN BINARY CODE

Answers

Answer: GET YOUR BONUS

in binary code

01000111 01000101 01010100 00100000 01011001 01001111 01010101 01010010 00100000 01000010 01001111 01001110 01010101 01010011

THX:

01010100 01001000 01000001 01001110 01001011 00100000 01011001 01001111 01010101

Answer:

01000111 01000101 01010100 00100000 01011001 01001111 01010101 01010010 00100000 01000010 01001111 01001110 01010101 0101001

Problem: A company wants a program that will calculate the weekly paycheck for an employee based on how many hours they worked. For this company, an employee earns $20 an hour for the first 40 hours that they work. The employee earns overtime, $30 an hour, for each hour they work above 40 hours.

Example: If an employee works 60 hours in a week, they would earn $20/hr for the first 40 hours. Then they would earn $30/hr for the 20 hours they worked overtime. Therefore, they earned: ($20/hr * 40hrs) + ($30/hr * 20 hrs) = $800 + $600 = $1400 total.

For this assignment, you must create pseudocode and a flowchart to design a program that will calculate an employee’s weekly paycheck.

Write pseudocode to design a programming solution by outlining a series of steps and using appropriate indentation and keywords. As you write your pseudocode, be sure to consider the following:
What input does the computer need?
What steps does the program need to follow to process the input? What output should result?
When might you need to use decision branching? If you used decision branching, did you account for all possible input values?
Did you use appropriate indentation and keywords (such as IF, ELSE, CALCULATE, and so on) throughout your pseudocode?
Create a flowchart to design a programming solution by organizing a series of steps and using appropriate symbols and arrows. As you create your flowchart, be sure to use appropriate arrows and symbols for each of the following:
Start and end points
Input and output
Decision branching
Processing steps
Note: You may find the correct shapes to create your flowchart on the Insert menu in Microsoft Word. Or you may draw your flowchart by hand, take a clear picture, and insert the picture into your Word document. Use the add shapes or insert pictures tutorials to help you. You could also use a flowcharting tool that you are familiar with, such as Lucidchart, if you prefer.

Answers

Using the knowledge in computational language in pseudocode  it is possible to write a code that programming solution by outlining a series of steps and using appropriate indentation and keywords.

Writting the code:

h = int(input('Enter hours '))

rate = 20

if h <= 40:

   pay = h * rate

elif h > 40:

   pay = ((h-40) * rate * 1.5) + rate * 40

print("Your pay is %.2f" % pay)

Set hourly rate to 20

Input hours worked

If hours worked is under 40

   Compute hours worked times hourly rate equals pay

Else hours worked is over 40

   Compute ?

Endif

Print pay

See more about pseudocode at brainly.com/question/12975450

#SPJ1

First,

- select a classification methodology to learn in your project. Select either Classification Trees or Support Vector Machines.

- To actually get the data used in the ISLR examples, you will likely need to download an R package called ISLR; it contains the data sets used in the text.

- Begin by introducing your reader to the corporation from which your stock data (Leggett & Platt Incorporated) comes. Tell the reader something you learned about that corporation that you found interesting, something which would demonstrate to a recruiter that you possess curiosity and the ability to employ it.

- Then, using trimmed screenshots where needed from Excel, sketch out for the reader how you converted your Yahoo-sourced stock data into lagged stock risk data set since 2006.

Second,

-draw a random sample of size n=300 without replacement from your stock return data set. Recall that your stock return data contains a HiLo return column and standardized log lag1 and log lag2 return columns. I will call this your n=300 stock return data set. Show and explain how this is done.

- draw another random sample of size 300 without replacement from your stock return data set. Recall that your stock risk data contains a HiLo risk column and standardized log lag1 and log lag2 columns. I will call this your n=300 stock risk data set.

Next, using your n=300 stock return data set, walk through the steps covered by the ISLR text for your chosen method, SVM or CART, explaining in your own words what you are doing. Put your name into the title of any graphs you show.

Finally, run the program on your n=300 stock risk data set and compare the performance to that of your n=300 stock return data set. Include use of the chi-square test. Discuss the differences, the reasons that these would happen, and the lessons learned about the nature of the stock market.

third,

Select one of the tuning parameters or decision criteria that lie beneath the surface of your chosen methodology, CART or CART. Engage with it by researching beyond the ISLR text. Then experiment with it. Experiment with your data and with other data sets. Try decreasing or increasing n. Look at other sources for help, documenting the sources.

Forth,

Create classification space plots for both of your n=300 data sets, using your chosen methodology, SVM or CART. Be sure to explain how you went about this. Create the plot using the same techniques that we did in our plots for other methods.

] Prepare a comparative study of knn, naive Bayes, logistic regression, and your selected method. Make this comparison on your two n=300 data sets, splitting the data randomly in half to get the training and testing sets.

Explain what you are doing as you go along, explain what you understand about what distinguishes the methods, discuss reasons why the results vary, and why there might be systematic differences in performance between return data and risk data. Show classification space plots for knn, naïve Bayes, and logistic regression. At the end, show a single table in which you summarize the overall correct forecast rate for the stock returns for the four methods; then another table summarizing the performance on the stock risk data

Answers

Using the knowledge of the computational language in python it is possible to write a code that Create classification space plots for both of your n=300 data sets, using your chosen methodology, SVM or CART.

Writting the code:

def randomize(X, Y):

   permutation = np.random.permutation(Y.shape[0])

   X2 = X[permutation,:]

   Y2 = Y[permutation]

   return X2, Y2

X2, y2 = randomize(X, y)

def draw_learning_curves(X, y, estimator, num_trainings):

   train_sizes, train_scores, test_scores = learning_curve(estimator, X2, y2, cv=None, n_jobs=1, train_sizes=np.linspace(0.1, 1.0, num_trainings))

   train_scores_mean = np.mean(train_scores, axis=1)

   train_scores_std = np.std(train_scores, axis=1)

   test_scores_mean = np.mean(test_scores, axis=1)

   test_scores_std = np.std(test_scores, axis=1)

   plt.grid()

   plt.title("Learning Curves")

   plt.xlabel("Training examples")

   plt.ylabel("Score")

   plt.plot(train_scores_mean, 'o-', color="g",

            label="Training score")

   plt.plot(test_scores_mean, 'o-', color="y",

            label="Cross-validation score")

   plt.legend(loc="best")

   plt.show()

See more about python at brainly.com/question/18502436

#SPJ1

1. Review and write summary report on Artificial Intelligence (AI), your report should include from starting point of Al to the future of AI in brief and short way.​

Answers

Summary report on Artificial Intelligence (AI):

The term artificial intelligence broadly refers to the application of technology to perform tasks that resemble human cognitive functioning, and is typically defined as "the ability of a machine to imitate intelligent human behaviour." Artificial intelligence typically involves "the theory and development of artificial intelligence systems capable of performing tasks that normally require human intelligence, such as visual perception, speech recognition, decision making, and  between languages." John McCarthy, one of the founders of the study of artificial intelligence, "defined the field of using computers to do things that are said to be intelligent when people do them."

Artificial intelligence is used as an umbrella term to cover a wide range of different technologies and applications, some of which are mentioned below.

Machine Learning (ML) Natural Language Processing (NLP) Computer vision (CV) Robotics Process Automation (RPA)

AI applications typically involve the use of data, algorithms and human feedback. Ensuring that all these components are properly structured and validated is essential to developing and deploying AI applications.

What is Machine Learning ?

Machine learning is a branch of computer science that uses algorithms to process and learn from large amounts of data. Unlike traditional rule-based programming, ML models10 learn from input data to predict or identify meaningful patterns without being specifically programmed to do so. There are different types of ML models depending on their intended task and structure:

Supervised Machine Learning: In supervised ML, a model is trained with labeled input data that correlates with a specified output. Reinforcement learning: In reinforcement learning, the model learns. dynamically to achieve the desired output through trial and error Unsupervised Machine Learning: In unsupervised ML, the input data is unlabelled and the output is undefined Deep Learning: A deep learning model is built on an artificial neural network where algorithms process large amounts of unlabelled or unstructured data through multiple learning layers  in a way inspired by how neural networks work in the brain

To learn more about machine learning, visit;

https://brainly.com/question/29386217

#SPJ9

IN python

Write a main function that asks the user to enter a series of numbers on the same line. The
function should store the numbers in a list and then display the lowest, highest, total, and average
of the numbers in the list in addition to the list of numbers above the average.
The program should have the following functions:
• A function that takes a list of numbers and returns the lowest number in the list.
• A function that takes a list of numbers and returns the highest number in the list.
• A function that takes a list of numbers and returns sum of the numbers in the list.
• A function that takes a list of numbers and returns the average of the numbers in the list.
• A function that takes a list of numbers and returns a list of numbers above the average.


Here is a sample run:
Enter numbers on the same line
10 23 45 71 8 13 99 5 2 88
Low: 2.0
High: 99.0
Total: 364.0
Average: 36.4
Above Average: [45.0, 71.0, 99.0, 88.0]

iN python

Answers

Using the knowledge of the computational language in python it is possible to write a code that write a main function that asks the user to enter a series of numbers on the same line.

Writting the code:

def minimum(a):

   low = a[0]

   for i in range(1,n):

       if a[i] <= low:

           low = a[i]

   return low

def maximum(a):

   high = a[0]

   for i in range(1,n):

       if a[i] >= high:

           high = a[i]

   return high

def total(a):

   tot = 0

   for i in range(0,n):

       tot += a[i]

   return tot

def average(a):

   total = 0

   for i in range(0,n):

       total += a[i]

   return total/n

   

def above_average(a):

   total = 0

   for i in range(0,n):

       total += a[i]

       

   average = total/n

   above_avg = []

   for i in range(0,n):

       if a[i] > average:

           above_avg.append(float(a[i]))

       

   return above_avg

if __name__ == "__main__":

   print ('Enter numbers on the same line')

   a = list(map(int,input().split()))

   n = len(a)

   

   print("Low: {0:.1f}".format(minimum(a)))

   print("High: {0:.1f}".format(maximum(a)))

   print("Total: {0:.1f}".format(total(a)))

   print("Average: {0:.1f}".format(average(a)))

   print("Above Average:",above_average(a))

See more about python at brainly.com/question/18502436

#SPJ1

Design a flowchart or pseudocode for a program that accepts two
numbers from a user and displays one of the following messages: First
is larger, second is larger, and numbers are equal.

Answers

Using the knowledge in computational language in python it is possible to write the code that design a flowchart or pseudocode for a program that accepts two numbers from a user and displays

Writting the code:

firstNum=int(input("enter the firstNum "))

secondNum=int(input("enter the secondNum "))

First="First is larger"

Second="Second is large"

Equal="Numbers are equl"

if firstNum>secondNum:

print(First)

elif(secondNum>firstNum):

print(Second)

else:

print(Equal)

See more about python at brainly.com/question/18502436

#SPJ1

Account A can retrieve or modify any relation except DEPENDENT and can grant any of these privileges to other users. (b) Account B can retrieve all the attributes of EMPLOYEE and DEPARTMENT except for SALARY, MGRSSN, and MGRSTARTDATE. (c) Account C can retrieve or modify WORKS_ON but can only retrieve the FNAME, MINIT, LNAME, SSN attributes of EMPLOYEE and the PNAME, PNUMBER attributes of PROJECT. (d) Account D can retrieve any attribute of EMPLOYEE or DEPENDENT and can modify DEPENDENT. (e) Account E can retrieve any attribute of EMPLOYEE but only for EMPLOYEE tuples that have DNO = 3. (f) Write SQL statements to grant these privileges. Use views were appropriate

Answers

The SQL statements to grant these privileges are as follows:

GRANT SELECT, UPDATE

        ON EMPLOYEE, DEPARTMENT, DEPT_LOCATIONS, PROJECT,

        WORKS_ON

        TO ACCOUNTA

        WITH GRANT OPTION;

CREATE VIEW EMPS AS

        SELECT FNAME, MINIT, LNAME, SSN, BDATE, ADDRESS, SEX

        SUPERSSN, DNO

        FROM EMPLOYEE;

        GRANT SELECT ON EMPS

       TO ACCOUNTB;

       CREATE VIEW DEPTS AS

       SELECT DNAME, DNUMBER

       FROM DEPARTMENT;

       GRANT SELECT ON DEPTS

       TO ACCOUNTB;

GRANT SELECT, UPDATE

       ON WORKS_ON

       TO ACCOUNTC;

      CREATE VIEW EMP1 AS

      SELECT FNAME, MINIT, LNAME, SSN

      FROM EMPLOYEE;

      GRANT SELECT ON EMP1

      TO ACCOUNTC;

      CREATE VIEW PROJ1 AS

      SELECT PNAME, PNUMBER

      FROM PROJECT;

     GRANT SELECT ON PROJ1

     TO ACCOUNTC;

GRANT SELECT ON EMPLOYEE, DEPENDENT

       TO ACCOUNTD;

      GRANT UPDATE ON DEPENDENT

      TO ACCOUNTD;

CREATE VIEW DNO3_EMPLOYEES AS

        SELECT * FROM EMPLOYEE

        WHERE DNO = 3;

        GRANT SELECT ON DNO3_EMPLOYEES

        TO ACCOUNTE;

What do you mean by SQL statement?

SQL statement may be defined as a domain-specific language that is significantly utilized in programming and designed for controlling data held in a relational database management system. SQL stands for Structured Query Language.

Therefore, the SQL statements to grant these privileges are well described above.

To learn more about SQL statements, refer to the link:

https://brainly.com/question/14312429

#SPJ1

3. Programmers use indenting to organize their code so that it is readable and can be easily debugged. x = 12 if x ==12: print ("x is equal to 12.")

Which of the following keys on the keyboard is used to quickly indent text?
*
Control
Return
Tab
Right Arrow

Answers

Answer:Quickly indent text can be done using key Tab on the keyboard.

Answer: Option C

Explanation:

Code is readable and can be easily debugged because programmers use indenting to organize it . In a computer, any programmer to develop a program both space and tab keys can be used to indent text.

Tab key used to indent the text quickly whereas the space key used to indent text but not to indent text quickly. Tab can be used as the standard key for indenting in the computer programs.

Explanation:

The correct answer would option c

Implication if the intellectual property rights do not exist

Answers

Intellectual Property Rights (IPR) are  the creative rights over an original piece of work, invention or even an idea behind a business can come under the purview of Intellectual Property Rights Act.

Implication if the intellectual property rights do not exist

1.  Less research and development as nobody would reap benefits generated by their innovations.

2. Cultural and art vitality as they would not be made more according to their original work.

3. Job losses and economic issues as IPR helps in boosting both of these factors.

4. Healthcare and treatment would be at lost because of less innovation of useful vaccines.

5. Less emergence of startups with unique ideas, decline in innovative trade and a race backwards.

6. Counterfeiting of journals, research papers leading to a still situation.

Hence, these factors explain what would happen without IPR.

To know more about Intellectual property rights from the given link

https://brainly.com/question/24015145

#SPJ13

Q: Define the following terms:
(i) Computer
(ii) Program
(iii) Data

Answers

i) an electronic device for storing and processing data according to instructions given to it in a variable program. -computer
ii) A collection of instructions that performs a specific task when executed by a computer. - program
iii) Data is a collection of numbers gathered to give some information. - data

model sees communication occurring in five key parts
19. The
20
means the systematic application of scientific or other organized knowledge to practical task
21. The model that shows our communication is influenced by environmental, cultural and personal
factors
22. Shannon Weaver model was proposed in the year
23. Fourth generation computers used
24. Auto Gasoline pump is an example of a
25.
26.
27.
28.
29.
30. A server may run several
31. The first mechanical computer designed by Charles Babbage uses,
32.
33. The first generation of computer uses
34
computer
computer are mainly used in the fields of science and engineering
provides us with necessary diversion
available for educational purposes other than the teacher
are the means of communication
is when two persons communicate with each other.
controls educational technology in every way.
is the order in which the content should be taught for the best teaming within a grade?
is a distortion in a message which affects the flow of communication
refers to the facilities used for motion pictures, television, computer, sounds?
35.
36. Aristotle model proposed in the year
37. The first computer designed by Charles Babbage was called
38. Communication result in sharing of
and
39. A Supercomputer is the very
40.
41. A typical modern computer uses
42
and
is the operation of data per giving instruction
type of computer for processing data
chips
computer are used in scientific calculations, for nation defense and radar systems
43. The person who is responsible in the integration of technology in classroom instruction is-
44. A server run several
45. These are types in the classifications of the computer according to size, Except
46 Second generation computers used.
47.
48. The acronomy SNS stands for
is used to send individual or group messages
49. These are example of Barriers in communication, Except
50. Computer cannot do anything without a
PRI

Answers

Model sees comunication key parts so its 15 x because it sayd on the text

Consider a 3x4 rectangular shape room. Four computers are located at the four
corners of the room. The HUB is placed on the center of the room. Calculate the
minimum length of cables required to connect the computers in a network in each of the
following topologies:
a) Bus topology
b) Ring topology
c) Star topology
d) Mesh topology

Answers

The minimum length of cables required to connect the computers in a network in each of the bus topology. Thus, option (a) is correct.

What is computers?

Computer is the name for the electrical device. In 1822, Charles Babbage created the first computer. The work of input, processing, and output was completed by the computer. Hardware and software both run on a computer. The information is input into the computer, which subsequently generates results.

According to givens the scenario was the justify are the 3×4 rectangular shape room there are the four computers are the set-up to the HUB is placed in the center of the room. The bus topology is the based on the networks are the subsequently.

As a result, the minimum length of cables required to connect the computers in a network in each of the bus topology. Therefore, option (a) is correct.

Learn more about on computers, here:

https://brainly.com/question/21080395

#SPJ2

Python programming using def function

Give the user a math quiz where they have
to subtract 2-digit integers. Present them
like this: 67 - 55.
Each time, tell the user whether they are
correct or incorrect. Continue presenting
problems to them until they enter a zero to
quit. At the end print the number right,
the number wrong, and the percent right.

Answers

Explanation:

For this program we'll need to know a couple concepts which are: while loops, user input, variables, converting strings to integers, and basic arithmetic operators, if statements, and the random module.

So let's first just declare the basic function, we can call this "main", or something a bit more descriptive, but for now I'll name it "main".

def main():

   # code will go here

main()

so now from here, we want to initialize some variables. We need to somehow keep track of how many they get correct and how many they've answered.

These two numbers may be the same, but at times they will be different from each other, so we'll need two variables. Let's just call the variable tracking how much have been answered as "answered" and the variable tracking how much are correct as "correct".

These two will initially be zero, since the user hasn't answered any questions or gotten any correct. So now we have the following code

def main():

   correct = 0

   answered  = 0

main()

Now let's use a while loop, which we break out of, once the user inputs zero. This may be a bit tricky if we use a condition since we'll have to ask for input before, so let's just use a while True loop, and then use an if statement to break out of it at the end of the loop.

Now we want to generate two numbers so we can use the random module. To access the functions from the random module you use the import statement which will look like this "import random". Now that you have access to these functions, we can use the randint function which generates random numbers between the two parameters you give it (including those end points). It says two digits, so let's use the endpoints 10 and 98, and I'll explain later why I'm limiting it to 98 and not 99.

The reason we want to limit it to 98 and not 99, is because it's possible for the two randomly generated numbers to be equal to each other, so the answer would be zero. This is a problem because the zero is used to quit the program. So what we can do in this case, is add one to one of the numbers, so they're no longer equal, but if they're equal to 99, then now we have a three digit number.

Now onto the user input for simplicitly, let's assume they enter valid input, all we have to do is store that input in a variable and convert it into an integer. We can immediately convert the input into an integer by surrounding the input by the int to convert it.

we of course want to display them the equation, and we can either do this through string concatenation or f-strings, but f-strings are a bit more easier to read.

So let's code this up:

import random

def main():

   correct = 0

   answered  = 0

   while True:

       num1 = random.randint(10, 98)

       num2 = random.randint(10, 98)

       

       if num1 == num2:
           num2 += 1

       userInput = int(input(f"{num1} - {num2}"))

main()

from here we first need to check if they entered zero and if so, break out of the loop. If they didn't enter zero, check if the userInput is equal to the actual answer and if it is, then add one to correct and finally add one to answered regardless of whether their answer is correct or not.

Outside the loop to display how much they got correct we can use an f-string just like we did previously. Since sometimes we'll get a non-terminating decimal, we can use the round function so it rounds to the nearest hundreth.

So let's code this up:

import random

def main():

   correct = 0

   answered  = 0

   while True:

       num1 = random.randint(10, 98)

       num2 = random.randint(10, 98)

       if num1 == num2: # the answer would be zero
           num2 += 1 # makes sure the answer isn't zero

       userInput = int(input(f"{num1} - {num2}"))

       if userInput == 0: # first check if they want to stop

           break

       if userInput == (num1 - num2):
           correct += 1

       answered += 1

   print(f"Correct: {correct}\nIncorrect: {answered - correct}\nPercent: {round(correct/answered, 2)}")

main()

and that should pretty much be it. The last line is just some formatting so it looks a bit better when displaying.

Give some examples of when either breaking the rules or following the rules lead to greater good

Answers

Answer:

Sometimes breaking a rule can lead to a positive outcome, especially if the rule prevents the positive. But on the other hand, following the rules, can also lead to the greater good, if the rule doesn't prevent the good from happening.

Explanation:

A ____ risk assessment evaluates threats to and vulnerabilities of the network.

Answers

Answer:

Vulnerability

Explanation:

Vulnerability refers to a weakness in your hardware, software, or procedures

Write an expression using Boolean operators that prints "Special number" if special_num is -99, 0, or 44.

Answers

A sample expression that uses Boolean operators that prints "Special number" if special_num is -99, 0, or 44 is given below:

The Program

import java.util.Scanner;

import java.io.*;

public class Test

{

   public static void main(String[]args) throws IOException

   {

       File file = new File("SNUMS.INP");

       Scanner inputFile = new Scanner(file);

       int order = 1;

       int i = 1;

      int[] special = new int[1000000+1];

       // Write all 10^6 special numbers into an array named "special"

       while (order <= 1000000)

       {

           if (specialNumber(i) == true)

           {

              special[order] = i;

               order++;

           }

           i++;

       }

       // Write the result to file

       PrintWriter outputFile = new PrintWriter("SNUMS.OUT");

       outputFile.println(special[inputFile.nextInt()]);

       while (inputFile.hasNext())

           outputFile.println(special[inputFile.nextInt()]);

       outputFile.close();

   }

   public static boolean specialNumber(int i)

   {

       // This method check whether the number is a special number

       boolean specialNumber = false;

      byte count=0;

       long sum=0;

       while (i != 0)

       {

           sum = sum + (i % 10);

           count++;

           i = i / 10;

       }

       if (sum % count == 0) return true;

       else return false;

    }

}

Read more about boolean operators here:

https://brainly.com/question/5029736

#SPJ1

Explain why you would select the waterfall model to implement the baby monitoring system by describing the advantages of using the waterfall model in projects like this which consists of a large scope.

Answers

The waterfall model's benefits includes Teams must follow a set of stages in a waterfall process, never going on until each phase is finished. Smaller projects with clear-cut deliverables from the beginning are best suited for this framework.

Why did you choose waterfall model?

When a project must adhere to stringent guidelines, the waterfall technique is preferable because it calls for deliverables for each step before moving on to the next.

Note that As an alternative, Agile is better suited for teams who want to move quickly, experiment with direction, and start without knowing exactly how the project will turn out.

Therefore, The sequential Waterfall Model separates software development into pre-established segments. Before the following phase can start, each phase must be finished.

Learn more about Waterfall Model from

https://brainly.com/question/14079212
#SPJ1

Write a java program to find the average of any three numbers.​

Answers

import java.util.Scanner;

public class JavaExample {

public static void main(String[] args)

{

Scanner scan = new Scanner(System.in);

System.out.print("Enter the first number: ");

double num1 = scan.nextDouble();

System.out.print("Enter the second number: ");

double num2 = scan.nextDouble();

System.out.print("Enter the third number: ");

double num3 = scan.nextDouble();

scan.close();

System.out.print("The average of entered numbers is:" + avr(num1, num2, num3) );

}

public static double avr(double a, double b, double c)

{

return (a + b + c) / 3;

}

}

The output is attached to the answer. You can also check it..

help help help help....​

Answers

Answer:redo reload copy cut paste bullet list highlight bold numbered list center right left.

Explanation:

That's all I can help with right now

How is trust built?
Select all the correct options and click Submit.
Trust is built incrementally.
Trust is earned behaviorally.
Trust is built by spending a lot of time with people.
Trust is built by being pleasant and polite.

Answers

The trust is built by the following options:

Trust is built incrementally.Trust is earned behaviorally.Trust is built by spending a lot of time with people.

How trust is built?

Trust is built by spending much time with the people you are in contact with you have to observe the behavioral characteristics and notice the behavior accordingly. Most important characteristics to build trust: Honesty, Integrity, Transparency etc. Hence to conclude along with certain observance and characteristics trust is built. Consistency often leads to trust. We have the most faith in people who are always there for us, in good and bad times. Showing someone you're there to assist them on a regular basis is a great way to build trust.

To know more about trust please follow the link below:

https://brainly.com/question/11875869

#SPJ1

5. Define a procedure “DistanceBetweenTwoPoints” that will take four paramaters x1, y1, x2
and y2 and will calculate the distance between these two points using the formula
√((x2 – x1)² + (y2 – y1)²). You must use the SquareRoot function you defined previously.
[10 points]

Test case:
> (DistanceBetweenTwoPoints 2 5 3 2)
3.1622776601683795
Can anyone please help me to write this procedure in Scheme Language? I am stuck! Please help!

Answers

Using the knowledge in computational language in JAVA it is possible to write the code that define a procedure “DistanceBetweenTwoPoints” that will take four paramaters x1, y1, x2 and y2.

Writting the code:

package org.totalbeginner.tutorial;

public class Point {

   public double x;

   public double y;

   Point(double xcoord, double ycoord){

       this.x = xcoord;

       this.y = ycoord;

   }

   public double getX() {

       return x;

   }

   public double getY() {

       return y;

   }    

}

package org.totalbeginner.tutorial;

public class Line {

   double x;

   double y;

   Point p1 = new Point(2.0,2.0);

   Point p2 = new Point(4.0,4.0);

   Point mp = new Point(x,y);

   public void midpoint() {

       x = (p1.getX() + p2.getX()) / 2;

       y = (p1.getY() + p2.getY()) / 2;

   }

See more about JAVA at brainly.com/question/12975450

#SPJ1

Other Questions
Substitution2x-6y=18x = 3y + 9 11. Using the equation: y + 2 = 3(x - 1).a) Identify the slope and y-intercept.b) Graph the equation.c) Does the point (0,0) satisfy the equation?Justify your answer. If the price of gas was $3.12 on the first day of school and $3.55 on the fifth day, what was the rate of change in the price of gas per day) Find the average rate of change. Solve for x. 4(2x-17)=4x+(-5) George runs cross country. He runs 3 miles in 24 minutes. If he keeps the same pace how long will it take him to run 7 miles? The maximum distance D(h) in kilometers that a person can see from a height h kilometers above the ground is givenby the function D(h) = 111.7/h. Find the height that would allow a person to see 40 kilometers.h=km(Round to two decimal places as needed.)... A cycle Wheel does 1645 full turns in 7 minutes work out the number of full turns per minute Solve The ProblemAll the students in grades 3, 4 and 5 are going on a field trip to Coney IslandEach grade has 125 students. The cafeteria needs to pack lunches. About howmany students are going on the trip? Represent the exact amount of studentin all three grades using an array, How many students are there altogether? Which type of neuron begins in most body organs and carries information toward the central nervous system?. If this is true, why is China gradually and systematically exterminating the Uyghur peoples in Xinjiang, conduction a protracted cultural war against the Tibetan people to destroy their religion and cultural identity, and banning the teaching of the ethnic Mongol language? (without plagiarizing write 200 words please) How can a negative number be written in scientific notation? PLS AWNSER For example, what is 0.0026 written in scientific notation?Does any part of the process change because the number being converted is negative? a patient has had a traumatic amputation of the left leg above the knee following an industrial accident. what type of disability does this patient have? How can peace and friendship be extended through out the world give me the answer which won't come while searching it on brainly if it happens then I will give the brainlest answer what does a profilometer do? question 11 options: measures the wavelengths of light emitted or absorbed by an object separates items for chemical analysis uses a laser to measure the heights and depths of toolmarks allows the examiner to see the evidence toolmark and the reference toolmark simultaneously reasons for the struggle of Pakistan basmati rice in the international market serena is trying to sell a new line of ultrasound imaging equipment. unlike existing technology, these machines are compact, creating the potential for general practice physicians to have and use them in their offices. serena is trying to identify innovators in her market, knowing these customers will most likely buy one for each office in their practices. reposition his products. not need any service or support when using the product. spread positive word-of-mouth to other physicians. create demand among the late majority. wally, incorporated issues $100,000 of 5% bonds, due in 10 years, when the market rate of interest is 6%. interest is paid semiannually on june 30 and december 31. the issue price of the bonds is: Dr Jeckyll and? I dony remember Your company sells 19 units at a price of $10 and must change price to $9. 90 in order to sell 20 units. What is the marginal revenue of the twentieth unit?.