Questions
What data type will Python pick for the following variable? radio = '101.5' A. integer (i.e....

What data type will Python pick for the following variable?

radio = '101.5'

A.

integer (i.e. int)

B.

string (i.e. str)

C.

floating point number (i.e. float)

D.

list

Which of the following Python statements changes the first element of a tuple my_tuple to 17?

A.

my_tuple[0] = 17

B.

my_tuple[0] == 17

C.

both (A) and (B)

D.

none of the above

Suppose there are two sections of CSC121 and each section has 10 students. Their midterm exam scores are stored in two lists score_list1 and score_list2. Which of the following Python program fragments displays all these midterm exam scores?

A.
combined_list = [score_list1, score_list2]
for element in combined_list:
    for score in element:
        print (score)
B.
combined_list = score_list1 + score_list2
for element in combined_list:
    print (element)
C.

both (A) and (B)

D.

none of the above

def main():

    age = float(input('Enter age: '))

    # insert statement here to call the buffet_price function

    print('Please pay $', price)

def buffet_price(age):

    if age >= 60 or age <= 10:

        price = 9

    else:

        price = 12

    return price

main()

Which of the following statements should be used to call the buffet_price function?

A.

buffet_price(price, age)

B.

buffet_price(age, price)

C.

price = buffet_price(age)

D.

age = buffet_price(price)

In: Computer Science

The SOC has noticed an unusual volume of traffic coming from an open wi-fi guest Network...

The SOC has noticed an unusual volume of traffic coming from an open wi-fi guest Network that appears correlated with a border Network slow down. The network team is unable to capture traffic, but logs from Network Services are available.

  • No users have authenticated recently there was a guest networks captive portal

  • DDoS mitigation systems are not alerting

  • DNS resolver logs show some very long domain names

Which of the following is the best step for security analysis to take next?

  1. Block all outbound traffic from the guest Network at the border firewall

  2. verify the passphrase on the guest network has not been changed

  3. search antivirus logs for evidence of compromise company device

  4. review access point logs to identify potential a zombie services

In: Computer Science

a) A researcher was interested in whether the female students who enrolled in her stats course...

a) A researcher was interested in whether the female students who enrolled in her stats course were more interested in the topic than the males. The researcher obtained a random sample of 8 male and 8 female students and gathered their scores on an Interest in Statistical Topics (IST) Survey.

Girls’ IST scores: 21, 37, 22, 20, 22, 20, 22, 21

Boys’ IST scores: 20, 20, 20, 21, 21, 20, 23, 21

Test the researcher’s hypothesis using α =.05

In: Math

Use the following data to compute the option price for 3M: Stock price =100; Exercise price=90;...

Use the following data to compute the option price for 3M: Stock price =100; Exercise price=90; Interest rate=5%; Time to expiration= 3 months; Standard deviation = 20% per year; assume zero dividends.

A) According to the Black-Scholes model, what price should we expect for the call option? What price should we expect for the put option?

In: Finance

You now hold a position of power in our health care system. (You choose which position.)...

You now hold a position of power in our health care system. (You choose which position.) What three changes could you realistically attempt to make so that health care would be provided more ethically? Justify your decisions. Please write up to a page response.

In: Nursing

5 SENTENCES EACH What is a software myth? Describe the Three (3) Types of Software Myths...

5 SENTENCES EACH

What is a software myth?

Describe the Three (3) Types of Software Myths

Which of the Myths do you think would cause a software developer to be frustrated in a company setting? Explain why.

In: Computer Science

What are steps that leaders should take in adoption of emerging digital technologies?

What are steps that leaders should take in adoption of emerging digital technologies?

In: Operations Management

Identify a popular/common computer related product/solution that utilizes an interface that are not optimal for human...

Identify a popular/common computer related product/solution that utilizes an interface that are not optimal for human interaction. It must clearly identify the original problem that lead to the development of the solution. Describe how the users resolve the problem before the solution was developed and after the development of the solution. Explain why you think the solution is not optimal and how to improve the solution to provide a better interface for human interaction.

In: Computer Science

you will upload a 1-2 pages synopsis of " the importance of mobile apps in this...

you will upload a 1-2 pages synopsis of " the importance of mobile apps in this modern-day".

You should have a

  • table of contents,
  • introduce your topic, "the importance of mobile apps in this modern-day".
  • and give a general outline of how you intend to develop this topic.
  • Sources consulted must be appropriately cited and be part of the bibliography.
  • You should have at least 10 references.

In: Computer Science

(True or False) After diagnostic of an evaporator coil found covered with 1/2 of the coil...

(True or False) After diagnostic of an evaporator coil found covered with 1/2 of the coil of low & insufficient refrigerant levels?

In: Mechanical Engineering

At what separation distance can a proton hover above another proton due to electrostatic repulsion? Hint:...

At what separation distance can a proton hover above another proton due to electrostatic repulsion? Hint: Compare gravity to electrostatic repulsion. Please show step by step and explain how you got the numbers. Thanks

In: Physics

Forecasted Statements and Ratios Upton Computers makes bulk purchases of small computers, stocks them in conveniently...

Forecasted Statements and Ratios

Upton Computers makes bulk purchases of small computers, stocks them in conveniently located warehouses, ships them to its chain of retail stores, and has a staff to advise customers and help them set up their new computers. Upton's balance sheet as of December 31, 2016, is shown here (millions of dollars):

Cash $   3.5 Accounts payable $   9.0
Receivables 26.0 Notes payable 18.0
Inventories 58.0 Line of credit 0
Total current assets $ 87.5 Accruals 8.5
Net fixed assets 35.0 Total current liabilities $ 35.5
Mortgage loan 6.0
Common stock 15.0
Retained earnings 66.0
Total assets $122.5 Total liabilities and equity $122.5

Sales for 2016 were $350 million and net income for the year was $10.5 million, so the firm's profit margin was 3.0%. Upton paid dividends of $4.2 million to common stockholders, so its payout ratio was 40%. Its tax rate was 40%, and it operated at full capacity. Assume that all assets/sales ratios, (spontaneous liabilities)/sales ratios, the profit margin, and the payout ratio remain constant in 2017. Do not round intermediate calculations.

  1. If sales are projected to increase by $80 million, or 22.86%, during 2017, use the AFN equation to determine Upton's projected external capital requirements. Enter your answer in millions. For example, an answer of $1.2 million should be entered as 1.2, not 1,200,000. Round your answer to two decimal places.
    $  million
  2. Using the AFN equation, determine Upton's self-supporting growth rate. That is, what is the maximum growth rate the firm can achieve without having to employ nonspontaneous external funds? Round your answer to two decimal places.
    %
  3. Use the forecasted financial statement method to forecast Upton's balance sheet for December 31, 2017. Assume that all additional external capital is raised as a line of credit at the end of the year and is reflected (because the debt is added at the end of the year, there will be no additional interest expense due to the new debt).
    Assume Upton's profit margin and dividend payout ratio will be the same in 2017 as they were in 2016. What is the amount of the line of credit reported on the 2017 forecasted balance sheets? (Hint: You don't need to forecast the income statements because the line of credit is taken out on last day of the year and you are given the projected sales, profit margin, and dividend payout ratio; these figures allow you to calculate the 2017 addition to retained earnings for the balance sheet without actually constructing a full income statement.) Round your answers to the nearest cent.
    Upton Computers
    Pro Forma Balance Sheet
    December 31, 2017
    (Millions of Dollars)
    Cash $
    Receivables $
    Inventories $
    Total current assets $
    Net fixed assets $
    Total assets $
    Accounts payable $
    Notes payable $
    Line of credit $   
    Accruals $
    Total current liabilities $
    Mortgage loan $
    Common stock $
    Retained earnings $
    Total liabilities and equity $

In: Finance

Exercise 5.3: How will the Digital Revolution Affect Your Organization? Briefing (2) Ok, you are not...

Exercise 5.3: How will the Digital Revolution Affect Your Organization?

Briefing (2)

  • Ok, you are not leaving the organization after all. That briefing was designed to make you think about potential threats to your organization from agile and innovative “out of sector” competitors. Let us assume that the new business model that you have just described is real, and that somebody else has already thought about it---and may already be setting it up. How can your organization respond to that threat? Better still, how can your organization counter that threat before it emerges?

In: Operations Management

created a new StringBuilder sb using the following index: StringBuilder sb = new StringBuilder ("Welcome To...

created a new StringBuilder sb using the following index:

StringBuilder sb = new StringBuilder ("Welcome To ");

What would be sb after each of the following statements? Explain the methods used and how they change the content

sb.append("Java");

sb.insert(11, "HTML and ");

In: Computer Science

Assume you have found a USB memory stick in a car park, and you plugged the...

Assume you have found a USB memory stick in a car park, and you plugged the USB memory stick to your computer. Answer the following questions

1.  What are the security key objectives that could be threaten?

2.  Identify and define three types of malware, and give examples about how could they transported from the USB memory stick to your computer.

3.   What could you do to mitigate the security threats and use the contents of the USB memory stick safely?

In: Computer Science