Computer-aided engineering (CAE) and finite element analysis (FEA) Computer-aided manufacturing (CAM) including instructions to computer numerical control (CNC) machines. Photorealistic rendering and motion simulation. Document management and revision control using product data management (PDM).
Answer:
brainliest plsss
Explanation:
I think so this is what you had asked!!!!!!
hope it helps
Answer:
- def ending_time(hour, minutes, seconds, work_time):
- if((seconds + work_time) // 60 > 0):
- minutes = minutes + (seconds + work_time) // 60
- seconds = (seconds + work_time) % 60
-
- if(minutes // 60 > 0):
- hour = hour + (minutes // 60)
- minutes = minutes % 60
- else:
- seconds = seconds + work_time
-
- return str(hour) + ":" + str(minutes) + ":" + str(seconds)
-
- print(ending_time(2,30,59, 12000))
Explanation:
The solution code is written in Python 3.
Firstly create a function ending_time that takes the four required input parameters.
Next, create an if statement to check if the numerator of (seconds + work_times) divided by 60 is over zero. If so, increment the minute and reassign the remainder of the seconds to the variable (Line 2-4).
Next, create another if statement again to check if the numerator of (current minutes) divided by 60 is over zero, if so increment the hour and reassign the remainder of the minutes to the variable (Line 6-8)
Otherwise, just simply add the work_time to the current seconds
At last return the time output string (Line 12).
I am not sure what the 'following's are
but it should result the sum of all cells between and including C5 and C18.
One way to track who made these changes to the virtual machine cloud settings and when is to: D. enable cloud resource activity auditing.
<h3>What is a cloud?</h3>
In Computer technology, a cloud can be defined as the elastic leasing of pooled computer resources such as physical hardware through virtualization and over the Internet, so as to enable the storage and sharing of files and documents virtually and in real-time.
In this scenario, we can reasonably infer and logically conclude that one way to track who made these changes to the virtual machine cloud settings and when is to enable cloud resource activity auditing because it would provide a log of actions such as information about the engineer who made configuration changes.
Read more on a virtual machine here: brainly.com/question/12060797
#SPJ1
Complete Question:
Over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. You need a way to track who made these changes and when. What should you do?
A. Enable virtual machine API integration.
B. Rotate the cloud access keys.
C. Deploy an OSI layer 7 firewall.
D. Enable cloud resource activity auditing.