What is the extension of Qbasic ?​

Answers

Answer 1

Answer:

bas

Explanation:


Related Questions

Armstrong Numbers Programming challenge description: An Armstrong number is an n-digit number that is equal to the sum of the nth powers of its digits. Determine if the input numbers are Armstrong numbers. Input: Your program should read lines from standard input. Each line has a positive integer. Output: Print out True if the number is an Armstrong number, or False if not. Test 1 Test Input 351 Expected Output False

Answers

Answer:

Written in Python

number = int(input("Enter a number: "))

computesum = 0

lent = len(str(number))

for digit in str(number):

computesum += int(digit)**lent

if number == computesum:

print("true")

else:

print("false")

Explanation:

This line prompts user for Input input

number = int(input("Enter a number: "))

This line initialises the sum of the nth power of the digits to 0

computesum = 0

This line gets the length of input (i.e. number of digits)

lent = len(str(number))

The following iteration iterates through the digit to check for Armstrong numbers

for digit in str(number):

computesum += int(digit)**lent

This checks if the input number equals the computed sum

if number == computesum:

print("true") --- if yes, "true" is printed

else:

print("false") --- if otherwise, "false" is printed

See attachment for complete program in its right format

What is the advantage of using a translation look-aside buffer (TLB), also called associative memory, in the logical-physical address mapping process? Explain how the logical-physical address mapping logic works using an inverted page table. When does the MMU detect page-fault? Explain four of the main steps for resolving page faults.

Answers

Answer:

A) The advantage of using TLB is that it is used for storing the recent transactions of the virtual memory to the physical memory and this is used for the sole purpose of fast retrieval of data

B) When using an inverted table the logical-physical address mapping logic works as a hashing function by  connecting pieces of the hardware of logical address and getting them translated to the physical address. this hash function in turn generates the index to the frame table

C) The MMU detect page-fault when there is an exception been raised by the computer when a program is ran to access a memory page and this program is not mapped out by the MMU in the process

The four steps are :

The first step is to check on the memory address requested to make sure of  a  valid memory request.

 The second step is to setup A free frame  and a disk operation that is scheduled for getting the necessary page from the disk.

As the the I/O is been completed the processor table is been updated

Finally the   Instruction will get restarted from the beginning indicating what might have been caused by a page fault.

Explanation:

A) The advantage of using TLB is that it is used for storing the recent transactions of the virtual memory to the physical memory and this is used for the sole purpose of fast retrieval of data

B) When using an inverted table the logical-physical address mapping logic works as a hashing function by  connecting pieces of the hardware of logical address and getting them translated to the physical address. this hash function in turn generates the index to the frame table

C) The MMU detect page-fault when there is an exception been raised by the computer when a program is ran to access a memory page and this program is not mapped out by the MMU in the process

The four steps are :

The first step is to check on the memory address requested to make sure of  a  valid memory request.

 The second step is to setup A free frame  and a disk operation that is scheduled for getting the necessary page from the disk.

As the the I/O is been completed the processor table is been updated

Finally the   Instruction will get restarted from the beginning indicating what might have been caused by a page fault.

anthill is to ant _________ is as to king

Answers

Answer: palace or castle

Explanation: the anthill is the big place where the ants live and the palace is the big place where the king lives.

When would it be necessary to edit the information shown on an electronic business card?

Answers

Answer:

It's D dear

Explanation:

Answer:

D. to show only relevant information to people inside your organization

Explanation:

hope this helps :)

meaning of leanness in organization​

Answers

Answer:It is an organizational structure that is designed to create more customer value using fewer resources than a traditional organisational structure

Consider sending a packet from a source host to a destination host over a fixed route. List the delay components in the end-to-end delay. Which of these delays are constant and which are variable? Draw a picture to illustrate your network and where each type of delay occurs.

Answers

List the delay components in the end-to-end delay:
Processing delay
Transmission delay
Propagation delay
Queuing delay.
The processing delay, transmission delay, and propagation delay are constant. Reason is that, time taken to transmit data bits.
The queuing delay is variable.Reason is that, Only single packet transfer in queue process and waiting time depends on packet size.

The delay components in the end-to-end delay are processing delay, Transmission delay, Propagation delay, and Queuing delay.

What is an end-to-end Delay?

End-to-end delay, also known as one-way delay, is the length of time it takes for a packet to go from its source to its destination across a network. It is a word frequently used in the monitoring of IP networks, and it varies from round-trip time in that only the path from source to destination is measured.

Now according to the question, the propagation, transmission, and processing delays are all constant. The time required to send data bits is the cause.

Variable queuing delays exist.

The waiting time is dependent on packet size, and only one packet can be transferred at a time in the queue process.

To get more information about End-to-End delay :

https://brainly.com/question/28584250

#SPJ2

Write a function named getResults that accepts radius of a sphere and returns the volume and surface area. Call this function with radius = 3.5 , and display results in one decimal format.
volume = 4/3 * pi * r ^ 3
Surface Area = 4pi * r ^ 2​

Answers

Python

def getResults():

   radius = float(input())

   pi = 3.1415

   volume = 4/3 * pi * radius ** 3

   surfaceArea = 4*pi * radius ** 2.0

   print (volume)

   print (surfaceArea)

getResults()

C#:

       public static void Main(string[] args)

       {

           getResults(Convert.ToDouble(Console.ReadLine()));  

       }

       public static double[] getResults(double radius)

       {

           double radiusObj = radius;

           double volume = 1.33333333333 * Math.PI * Math.Pow(radiusObj, 3);

           double surfaceArea = 4 * Math.PI * Math.Pow(radiusObj, 2) ;

           double[] surfaceAndVolume = { volume, surfaceArea };

           Console.WriteLine(volume.ToString());

           Console.WriteLine(surfaceArea.ToString());

           return surfaceAndVolume;

       }

Java:

public static void main(String[] args)

   {

       Scanner  scanner = new Scanner(System.in);

       getResults(scanner.nextDouble());

   }

   public static double[] getResults(double radius)

   {

       double radiusObj = radius;

       double volume = 1.33333333333 * Math.PI * Math.pow(radiusObj, 3);

       double surfaceArea = 4 * Math.PI * Math.pow(radiusObj, 2) ;

       double[] surfaceAndVolume = { volume, surfaceArea };

       System.out.println(volume);

       System.out.println(surfaceArea);

       return surfaceAndVolume;

   }

Which kind of storage has a spinning platter?

magnetic hard disk

O server

O solid state hard disk

O cloud

Answers

Answer:

Magnetic hard disk

Explanation:

The type of storage that has a spinning platter is called MAGNETIC HARD DISK reason been that MAGNETIC HARD DISK are made up of one or more disks that are been covered with a magnetic coasting or magnetic material to help store information or data permanently on a desktop or a computer and lastly this type of disks help to read data and as well write and rewrite data.

help plz!!!!!!!!!! neeeeeeeeeeeeeeeeeeeeeeeeeeeeeedddddddddddd heeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeelllllllllppppppppppppppppppppppppppppppppppppppppppppppppppppppp

Answers

Answer:

how to those with other people is so good if you have

Answer:

for what what is your questions

wordList is a list of words that currently contains the values ["tree", "rock", "air"]
Which of the following lines will result in the list containing the values ["air", "rock", "air"]
A. wordList[0] = wordList[2]
B. wordList[2] = wordList[O]
C.insertitem(wordList, O, "air")
D. removeltem(wordList,0)

Answers

Answer:

A. wordList[0] = wordList[2]

Explanation:

Required

Which line would give ["air", "rock", "air"]

From the question, we have that:

wordList =  ["tree", "rock", "air"]

which means that:

wordList[0] = "tree"

wordList[1] = "rock"

wordList[2] = "air"

Analyzing the options.

A. wordList[0] = wordList[2]

This will assign the item in wordList[2] to wordList[0].

and the result would be

So:

wordList[0] = "tree"

would change to

wordList[0] = "air"

The new content of wordList would then be ["air", "rock", "air"]

Option (A) answers the question

The list variable wordList contains three string values, Hence, to obtain the list, ["air", "rock", "air"], the lines wordList[0] = wordList[2] would be used.

List values are indexed from 0 ; hence, tree = index 0 ; rock = index 1 ; air = index 2

To assign the the string "tree" to index 0, then wordList[2] is assigned to wordList[0].

wordList[0] is now "air"

Hence, the required line of code would be wordList[0] = wordList[2]

Learn more :https://brainly.com/question/19117781

uestion
7. If you want to learn how to perform an action, which feature of the Excel window should you use?

A. Quick Access toolbar
B. Tell Me box
C. Status bar
D. File tab

Please help ASAP

Answers

Answer:

B- tell me box

Explanation:

It tells you how to do something you don’t know how to do

Explain why the expected value of an F ratio is 1.00 when the null hypothesis is true if there is no treatment effect the numerator.

Answers

Answer:

The reason is that the f ratio is balanced due to the numerator and denominator having equal sources of variability.

Explanation:

The expected value of an F ratio is 1.00 when the null hypothesis is true because in a scenario where there is no treatment effect, we have both the numerator and the denominator of the F ratio both measuring equal sources of variability.

Whenever this happens then the F ratio will be balanced and also it will have a value that is near 1.00.

If process P0 is switched to process P1, state for P0 will be saved into ____, and state from ___ will be reloaded.

Answers

Answer:

1. PCB0

2. PCB1

Explanation:

Given that PCB is often referred to as Process Control Block, is a form of data structure that is applicable and utilized by the computer operating systems to store all the information concerning a process.

This process is carried out in a way that when Process P0 is initialized, the operating system established a related process that takes the computer processing unit from Process P0 and allocates it to Process P1, the Operating System, in turn, will save P0's PCB, and then reload P1's PCB.

Hence, If process P0 is switched to process P1, the state for P0 will be saved into "PCB0" and the state from "PCB1" will be reloaded.

jibran has made a presentation on save environment for a competition. his teacher suggested some changes.which view should be using following changes​

Answers

Answer:

Jibran has set up five slides in his new presentation and is ready to enter some text. He wants to focus on entering text without having to think about other PowerPoint elements such as graphics, pictures, sound, and animation. The best method for Jibran to enter text is by using which feature of Microsoft PowerPoint?

Write a function that will sum all of the numbers in a list, ignoring the non-numbers. The function should takes one parameter: a list of values (value_list) of various types. The recommended approach for this:

a. create a variable to hold the current sum and initialize it to zero.
b. use a for loop to process each element of the list.
c. test each element to see if it is an integer or a float, and, if so, add its value to the current sum.
d. return the sum at the end.

Answers

In python 3.8:

def func(value_list):

   lst = [x for x in value_list if type(x) == int or type(x) == float]

   return sum(lst)

print(func(["h", "w", 32, 342.23, 'j']))

This is one solution using list comprehensions. I prefer this route because the code is concise.

def func(value_list):

   total = 0

   for x in value_list:

       if type(x) == int or type(x) == float:

           total += x

   return total

print(func(["h", "w", 32, 342.23, 'j']))

This is the way as described in your problem.

Sptr is a pointer pointing to the beginning of an array called sarray. To access the value in sarray[3] by using the pointer, you would use:a) *sptr[*3] b) *sptr+3 c) sptr +3 d) *(sptr + 3)

Answers

Answer:

The correct option for accessing the value in sarray[3] is : d) *(sptr+3)

Explanation:

a) *sptr[*3]  is wrong option because its syntax is not right it will give errors.

b) *sptr+3 is also wrong option because it will add 3 to the value of sarray[0].

c) sptr+3 is wrong option because it will only access the address of sarray[3] not the value it contains.

d) *(sptr +3) is correct syntax for accessing value in sarray[3] by using pointer

PowerPoint is a visual aid for many speakers. Discuss some points to remember when adding text to a PowerPoint presentation. How do they help make the experience better for the audience and the presenter? What things can you do when creating a PowerPoint presentation to assure that your work adds to the speaker’s presentation without detracting attention from the speaker?

Answers

Answer:

Use a lot of spinning animations to draw attention. Use many colors. A lot of text so you can read from the slide in case you get lost.

kali linux os and window os who is the best​

Answers

Answer:

Windows

Explanation:

It is down to preference. I prefer windows due to its large compatibility with a wide range of apps.

Answer:

It is only what you prefer

Explanation:

im doing programming with kali and i have no problems. although windows is more user friendly and what people use on a day to day, kali is for pentsters mostly.

a good look of a web page depends upon?​

Answers

Answer:

Depends mostly on your opinion

different between input and output device​

Answers

Answer:

An input device is something you connect to a computer that sends information into the computer. An output device is something you connect to a computer that has information sent to it.

Explanation:

How should you specify box sizes on a web page if you want the boxes to vary according to the font size of the text they contain? A.
in pixels
B.
in inches
C.
as percentages
D.
in em units

Answers

Answer:

It's D: in em units

Explanation:

Plato

What are some areas in Computer Science that make use of multivariate statistical testing or MCM methods? Explain why they are used.

Answers

Explanation:

Computational modeling is one of the areas of Computer Science that uses mathematical systems to perform multivariate statistical tests to solve highly complex problems in multidisciplinary areas, such as medicine, engineering, science, etc.

An example of the use of multivariate statistical tests is social development research in social science, which uses multiple variables to find more hypotheses and greater coverage between variables.

Multivariate statistical tests have the benefit of making research more effective and providing a more systematic and real view of the study.

In the Allow list box in the Data Validation dialog box,the _____ option means that the cell will accept only times.A) ChronologyB) ClockC) TimeD) Calendar

Answers

Answer:

C) Time

Explanation:

Given that Data validation is a feature in Microsoft Excel in which a user used to specify or determines the type of value or characters that can be typed or entered into a cell.

For example, using data validation to ensure a value of a number is whole numbers, or to ensure character entry is less than 25 characters.

Hence, in this case, the correct answer is the TIME option, will only result in cell accepting only times.

Originally, Java was used to create similar apps as what other language?
Perl
Python
CSS
Javascript

Answers

Answer:

Python

Explanation:

Took the test

Originally, Java was used to create similar apps as other languages, which as python. The correct option is b.

What are computer languages?

The computer languages are Java and Python is in their conversion; the Java compiler converts Java source code into an intermediate code known as bytecode, whereas the Python interpreter converts Python source code into machine code line by line.

Curly braces are used in Java to define the beginning and end of each function and class definition, whereas indentation is used in Python to separate code into separate blocks.

Multiple inheritances is done partially through interfaces in Java, whereas Python continues to support both solitary and multiple inheritances.

Therefore, the correct option is b. Python.

To learn more about computer languages, refer to the below link:

https://brainly.com/question/14523217

#SPJ2

When was the information last updated

Answers

Wait what? I don’t understand

A Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with one of the nation’s largest

A)retail sellers of computers and related accessories.
B)in-store computer repair and service companies.
C)developers of computer operating systems.
D)makers of computer networking equipment.

Answers

Answer:

C

Explanation:

This job will have the largest amount of 1. computer programmers, 2. like-minded coworkers, and 3. a large number of like-minded coworkers.

Please give Brainliest if accurate!

The Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with developers of computer operating systems.

What is  the term like-minded?

The Definition of the term like-minded is known to be when two or more people like or have the same purpose, habit or thought.

Therefore we can say that The Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with developers of computer operating systems.

Learn more about Programmer from

https://brainly.com/question/23275071

#SPJ2

what is the norm that psychoanalysis of Freud deviates?

Answers

Answer:

Freud deviates from the norm of current mainstream psychology which has more or less lost its way - if it ever had one - under the influence of the same pressures which produce our dysfunctional politics and our troubled societies at large (technological change, globalisation, and so on).

Explanation:

Creds to Quora

13 List five examples of functionality that can be added when using express
cards?

Answers

Answer:

This Answer Was Pasted Over From ayushisingh5

Explanation:

ExpressCards can connect a variety of devices to a computer including mobile broadband modems (sometimes called connect cards), IEEE 1394 (FireWire) connectors, USB connectors, Ethernet network ports, Serial ATA storage devices, solid-state drives, external enclosures for desktop-size PCI Express graphics cards and ...

Explain
the three types of periodic
maintanance. .​

Answers

Answer:

poop i think

Explanation:

A server process in Host B has a welcoming socket at port 977. What will trigger the server process to create a connection socket?

Answers

Answer:

Explanation:

This connection socket will be created when Host B receives a TCP SYN segment that contains the destination port number 977. This means that there is data that is trying to enter through that port number, as a welcoming socket this destination is available and when data requests access through it the OS creates a connection socket using Host B in order to allow access to the TCP SYN segment.

Other Questions
Read the two excerpts from the call of the wild describing the wolfThe wolf whirled about,pivoting on his hind legs after the fashion of joe and all concerned husky dogs , snarling and bristling, clipping his feathers together in a continuous and rapid succession of snaps ***For the better part of an hour of the wild brother ran by his side , whining softlyHow has the wolf changed?He has become anxious about his packHe has become friendlier toward buckHe has become timid because of the soundsHe has become stronger in his demeanor When a judge analyzes law, what document is used to determine the law's validity? the individual state's law the US Constitution the Declaration of Independence the majority opinion Find the 15th term of the arithmetic sequence whose common difference is d = 8 and whose first term is a,=5. What wave properties do x-rays and gamma rays possess that cause them to have such high energy? Wilson's Fourteen Points, excerpted above, reflect President Wilson's belief that military strength is a nation's best path to world trade military strength is a nation's best path to world trade industrial nations should have opportunities to govern colonies industrial nations should have opportunities to govern colonies isolationism should guide international relations isolationism should guide international relations people of all nations should select the government of their choice some safety precautions people should take when using fireworks 5(y + 2) = 6(y - 1)Show work Please and thank you Which of these types of changes is a physical change?A. Breaking apart one substance into two substancesB. Dissolving one substance in anotherC. Changing one substance into anotherD. Making a new substancePlease helpppp i'll love you forever Which best compares kinetic energy and temperature? 10. Which of the following is true about the cells formed from mitosis? *1 pointA.Each cell from the division will contain the same genetic information as the parent cell.B.The two cells created will have different genetic information.C.The cells formed during mitosis are called sister chromatids.D.The cells produced will have half of the normal number of chromosomes For babysitting, Nicole charges a flat fee of $3, plus $5 per hour. Write an equation for the cost, C, after h hours of babysitting. What do you think the slope and the y intercept represent? How much money will she make if she baby-sits 5 hours? A constant force pushes a 5 kg brick at 10 N. If the mass was tripled, what would happen to the acceleration if the same force is applied?(PLEASE SHOW WITH STEPS) Why have some countries in the Middle East become economically powerful?A. They have the greatest oil reserves.B. The region has the greatest coal reserves.C. They are the greatest exporters of automobiles.D. The countries are self-sufficient. write 3 numbers that make this inequality true: x>4 Edgar Allan Poe's narrator in "The Tell-Tale Heart" describes in detail the circumstances surrounding his murder of an old man. Analyze the narrator's reliability in 'The Tell-Tale Heart. Is he insane or is he sane? Use evidence from the passage to support your response. Redacta un texto de tres prrafos en el que analices la siguiente frase: "Lo bueno y lo justo para el hombre debe partir de su propia consciencia". Cada prrafo debe iniciar con los siguientes prefijos: Prrafo uno: Scrates ensea que ...Prrafo dos: La importancia del mensaje radica en que ... Prrafo tres: mi opinin sobre lo dicho por Scrates es ... Based on the excerpt you read and what you learned in the lesson, is William of Rubruck describing a traditional Mongol society or one that has adopted foreign customs? Explain your response in three to five sentences, identifying specific evidence from your reading to support your view. cual es la formula del rombide.help me Which of the following makes a true statement about the case of State v. Justin B. Goode ? The defendant pleads guilty to the charges at his arraignment. The teacher testified that Goode would not break the law. The police officer could not find any evidence against Goode. The neighbor said that Goode sold him stolen video games.20 Points Which chemical equation below is balanced to follow the Law of Conservation of Mass?H2 + Cl2 + HClo 2 H2 + Cl2 + 3 HCI2 H2 + 2Cl2 2 HCIH2 + Cl2 2 HCI