1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tatiana [17]
2 years ago
10

Suppose that you have declared a numeric array named numbers, and two of its elements are numbers[1] and numbers[4]. You know th

at _________.
Computers and Technology
1 answer:
vredina [299]2 years ago
7 0

Answer:

there are exactly two elements between those two elements

You might be interested in
Which colour scheme and design elements would you choose for a website for a neighbourhood swim team
ladessa [460]
F this is not related to math I’d pick light blue or a teal blue with either white or gold
7 0
2 years ago
What is the climax of Ralph breaks the internet?
Murljashka [212]

Answer:

As with the real internet, side quests often end up becoming main quests, and Vanellope falls in love with the gritty nature of internet gaming (through Gal Gadot's speed-racer Shank). Ralph Breaks The Internet also ends up going into the dark web and uses that to form the base of the climax of the film.

Explanation:

hope that help thanx

6 0
3 years ago
A file concordance tracks the unique words in a file and their frequencies. Write a program that displays a concordance for a fi
victus00 [196]

Answer:

I am writing a Python program.

def concordance(filename):  # function that takes a file name as parameter and returns the concordance for that file

   file = open(filename,"r")  #opens file in read mode

   unique={}  #creates and empty list

   for word in file.read().split():  #loops through every word in the file

       if word in unique:  # if words is already present in the list

           unique[word] += 1  #add 1 to the count of the existing word

       else:    #if word is not present in the list

           unique[word] = 1 #add the word to the list and add 1 to the count of word

           file.close();  # close the file

   for x in sorted(unique):  #sort the list and displays words with frequencies

       print(x, unique[x]);  #prints the unique words and their frequencies in alphabetical order

#prompts user to enter the name of the file

file_name=input('Enter the input file name: ')

concordance(file_name)  #calls concordance method by passing file name to it

Explanation:

The program has a function concordance that takes a text file name as parameter and returns a list of unique words and their frequencies.

The program first uses open() method to open the file in read mode. Here "r" represents the mode. Then creates an empty list named unique. Then the for loop iterates through each word in the file. Here the method read() is used to read the contents of file and split() is used to return these contents as a list of strings. The if condition inside the loop body checks each word if it is already present in the list unique. If the word is present then it adds 1 to the count of that word and if the word is not already present then it adds that unique word to the list and assign 1 as a count to that word. close() method then closes the file. The second for loop for x in sorted(unique):  is used to display the list of unique words with their frequencies. sorted() method is used to sort the list and then the loop iterates through each word in the list, through x, which acts like an index variable, and the loop displays each word along with its frequency.

6 0
3 years ago
This question involves the implementation of the PasswordGenerator class, which generates strings containing initial passwords f
liq [111]

The following code will be used for the PasswordGenerator class.

<u>Explanation:</u>

import java.util.Random;

public class PasswordGenerator {

   private static int passwordsGenerated =0;

   private static Random random = new Random();

   private String prefix;

   private int length;

   public PasswordGenerator(int length,String prefix) {

       this.prefix = prefix;

       this.length = length;

   }

   public PasswordGenerator(int length) {

       this.prefix = "A";

       this.length = length;

   }

   public String pwGen(){

       String pwd= this.prefix+".";

       for(int i=1;i<=this.length;i++){

           pwd+=random.nextInt(10);

       }

       passwordsGenerated+=1;

       return pwd;

   }

   public int pwCount(){

       return passwordsGenerated;

   }

   public static void main(String[] args) {

       PasswordGenerator pw1 = new PasswordGenerator(4,"chs");

       System.out.println(pw1.pwCount());

       System.out.println(pw1.pwGen());

       System.out.println(pw1.pwGen());

       System.out.println(pw1.pwCount());

       PasswordGenerator pw2 = new PasswordGenerator(6);

       System.out.println(pw2.pwCount());

       System.out.println(pw2.pwGen());

       System.out.println(pw2.pwCount());

       System.out.println(pw1.pwCount());

   }

}

8 0
3 years ago
The basic PowerPoint template has a simple presentation format with two text boxes, title and _____.
stiks02 [169]

Question: The basic PowerPoint template has a simple presentation format with two text boxes, title and ____

Answer: slide show

Explanation: this is the most logical answers because after all those steps in the presentation this is the next one


Question: The main reason many users have access to Outlook is to manage their e-mail communications and their

Answer: calendering

Explantion: this is used for messsaging and contacts and you also use it for to put important stuff on your calender

question answered by

(jacemorris04)

7 0
4 years ago
Read 2 more answers
Other questions:
  • "The OSI model has seven layers and the DoD has four. At which layer does SMTP works in both models"?
    15·1 answer
  • Akira has trouble reading what is on the computer screen and sometimes seeing pictures on websites. As her friend, you explain t
    8·1 answer
  • Can somebody help me with this problem
    10·1 answer
  • 6. Which of the following is malware? (1 point)
    10·2 answers
  • teve wants to use Google Display Ads to reach new customers who are looking to purchase products similar to his. Which audience
    14·1 answer
  • John is runnig his Database application on a single server with 24 Gigabytes of memory and 4 processors. The system is running s
    6·1 answer
  • Describe PROM, EPROM and EEPROM memories​
    7·1 answer
  • Function of an actuator
    8·2 answers
  • Please help me please i really need helpp so i can pass
    13·1 answer
  • Who here has a crush on jk from bts but feels more mature than him
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!