What data type will Python pick for the following variable?
radio = '101.5'
A. |
integer (i.e. int) |
|
B. |
string (i.e. str) |
|
C. |
floating point number (i.e. float) |
|
D. |
list |
Which of the following Python statements changes the first element of a tuple my_tuple to 17?
A. |
my_tuple[0] = 17 |
|
B. |
my_tuple[0] == 17 |
|
C. |
both (A) and (B) |
|
D. |
none of the above |
Suppose there are two sections of CSC121 and each section has 10 students. Their midterm exam scores are stored in two lists score_list1 and score_list2. Which of the following Python program fragments displays all these midterm exam scores?
A. |
combined_list = [score_list1, score_list2] for element in combined_list: for score in element: print (score) |
|
B. |
combined_list = score_list1 + score_list2 for element in combined_list: print (element) |
|
C. |
both (A) and (B) |
|
D. |
none of the above |
def main():
age = float(input('Enter age: '))
# insert statement here to call the buffet_price function
print('Please pay $', price)
def buffet_price(age):
if age >= 60 or age <= 10:
price = 9
else:
price = 12
return price
main()
Which of the following statements should be used to call the buffet_price function?
A. |
buffet_price(price, age) |
|
B. |
buffet_price(age, price) |
|
C. |
price = buffet_price(age) |
|
D. |
age = buffet_price(price) |
In: Computer Science
The SOC has noticed an unusual volume of traffic coming from an open wi-fi guest Network that appears correlated with a border Network slow down. The network team is unable to capture traffic, but logs from Network Services are available.
No users have authenticated recently there was a guest networks captive portal
DDoS mitigation systems are not alerting
DNS resolver logs show some very long domain names
Which of the following is the best step for security analysis to take next?
Block all outbound traffic from the guest Network at the border firewall
verify the passphrase on the guest network has not been changed
search antivirus logs for evidence of compromise company device
review access point logs to identify potential a zombie services
In: Computer Science
a) A researcher was interested in whether the female students who enrolled in her stats course were more interested in the topic than the males. The researcher obtained a random sample of 8 male and 8 female students and gathered their scores on an Interest in Statistical Topics (IST) Survey.
Girls’ IST scores: 21, 37, 22, 20, 22, 20, 22, 21
Boys’ IST scores: 20, 20, 20, 21, 21, 20, 23, 21
Test the researcher’s hypothesis using α =.05
In: Math
Use the following data to compute the option price for 3M: Stock price =100; Exercise price=90; Interest rate=5%; Time to expiration= 3 months; Standard deviation = 20% per year; assume zero dividends.
A) According to the Black-Scholes model, what price should we expect for the call option? What price should we expect for the put option?
In: Finance
You now hold a position of power in our health care system. (You choose which position.) What three changes could you realistically attempt to make so that health care would be provided more ethically? Justify your decisions. Please write up to a page response.
In: Nursing
5 SENTENCES EACH
What is a software myth?
Describe the Three (3) Types of Software Myths
Which of the Myths do you think would cause a software developer to be frustrated in a company setting? Explain why.
In: Computer Science
What are steps that leaders should take in adoption of emerging digital technologies?
In: Operations Management
Identify a popular/common computer related product/solution that utilizes an interface that are not optimal for human interaction. It must clearly identify the original problem that lead to the development of the solution. Describe how the users resolve the problem before the solution was developed and after the development of the solution. Explain why you think the solution is not optimal and how to improve the solution to provide a better interface for human interaction.
In: Computer Science
you will upload a 1-2 pages synopsis of " the importance of mobile apps in this modern-day".
You should have a
In: Computer Science
(True or False) After diagnostic of an evaporator coil found covered with 1/2 of the coil of low & insufficient refrigerant levels?
In: Mechanical Engineering
At what separation distance can a proton hover above another proton due to electrostatic repulsion? Hint: Compare gravity to electrostatic repulsion. Please show step by step and explain how you got the numbers. Thanks
In: Physics
Forecasted Statements and Ratios
Upton Computers makes bulk purchases of small computers, stocks them in conveniently located warehouses, ships them to its chain of retail stores, and has a staff to advise customers and help them set up their new computers. Upton's balance sheet as of December 31, 2016, is shown here (millions of dollars):
Cash | $ 3.5 | Accounts payable | $ 9.0 | |
Receivables | 26.0 | Notes payable | 18.0 | |
Inventories | 58.0 | Line of credit | 0 | |
Total current assets | $ 87.5 | Accruals | 8.5 | |
Net fixed assets | 35.0 | Total current liabilities | $ 35.5 | |
Mortgage loan | 6.0 | |||
Common stock | 15.0 | |||
Retained earnings | 66.0 | |||
Total assets | $122.5 | Total liabilities and equity | $122.5 |
Sales for 2016 were $350 million and net income for the year was $10.5 million, so the firm's profit margin was 3.0%. Upton paid dividends of $4.2 million to common stockholders, so its payout ratio was 40%. Its tax rate was 40%, and it operated at full capacity. Assume that all assets/sales ratios, (spontaneous liabilities)/sales ratios, the profit margin, and the payout ratio remain constant in 2017. Do not round intermediate calculations.
Upton Computers Pro Forma Balance Sheet December 31, 2017 (Millions of Dollars) |
||
Cash | $ | |
Receivables | $ | |
Inventories | $ | |
Total current assets | $ | |
Net fixed assets | $ | |
Total assets | $ | |
Accounts payable | $ | |
Notes payable | $ | |
Line of credit | $ | |
Accruals | $ | |
Total current liabilities | $ | |
Mortgage loan | $ | |
Common stock | $ | |
Retained earnings | $ | |
Total liabilities and equity | $ |
In: Finance
Exercise 5.3: How will the Digital Revolution Affect Your Organization?
Briefing (2)
Ok, you are not leaving the organization after all. That briefing was designed to make you think about potential threats to your organization from agile and innovative “out of sector” competitors. Let us assume that the new business model that you have just described is real, and that somebody else has already thought about it---and may already be setting it up. How can your organization respond to that threat? Better still, how can your organization counter that threat before it emerges?
In: Operations Management
created a new StringBuilder sb using the following index:
StringBuilder sb = new StringBuilder ("Welcome To ");
What would be sb after each of the following statements? Explain the methods used and how they change the content
sb.append("Java");
sb.insert(11, "HTML and ");
In: Computer Science
Assume you have found a USB memory stick in a car park, and you plugged the USB memory stick to your computer. Answer the following questions
1. What are the security key objectives that could be threaten?
2. Identify and define three types of malware, and give examples about how could they transported from the USB memory stick to your computer.
3. What could you do to mitigate the security threats and use the contents of the USB memory stick safely?
In: Computer Science