Answer:
The solution code is written in Python
d = 1.5 + random.random() * 6
Explanation:
By presuming the Python random module is imported, we can use the <em>random</em> method to generate a random number. <em>random.random()</em> will give us a value in the range [0, 1). The ensure the lower limit is 1.5 instead of 0, we can add 1.5 to random.random()
This expression will give any value in range [1.5, 2.5)
To ensure the upper limit is set to 7.5, we tweak the previous expression to
- 1.5 + random.random() * 6
This expression will always multiply a random number from [0,1) with 6 and then only added with 1.5. This will always produce a random number that fulfill the inequality 1.5 ≤ d < 7.5
The window that shows instructions for a lab activity is known as the Cisco Packet Tracer Activity window.
<h3>What is Packet Tracer activity?</h3>
Cisco Packet Tracer is known to be a form of a comprehensive networking technology that is made for lecture and it is also a learning tool that gives a kind of a special combination that are made up of realistic simulation and visualization experiences as well as assessment, activity authoring capabilities, and others.
Hence, The window that shows instructions for a lab activity is known as the Cisco Packet Tracer Activity window.
Learn more about computer windows from
brainly.com/question/25243683
#SPJ1
Answer:
See explaination
Explanation:
2a)
A hacker group hacked into the Bay Area Rapid Transit system, this was done to protest BART’s shut down of wireless communication in some BART stations. Such attacks is done mostly to stand for some situation which happened previously. Hence, we can say it is a form a hacktivism. It was not ethical as it disrupted the system for some time.But this is also a form of protest which is been done by some group of peoples.
2b)
If a foreign government launches a hacking attack, it can be considered a war.
If this type of attack happens then the repercussions may result to the war.
2c)
We gave an analogy between merchants accepting some amount of shoplifting, on the one hand, and merchants and credit card companies accepting some amount of credit card fraud, on the other hand.
THe streght so called can be pointed out as the money is rolling in the market and the business keeps on going.
The weakness can be described as the loss which is being incurred by the company.
Answer:
for (int i = 0; i < 9; ++i)
{
int k = 0;
while (k < 20 && scotus[i][k] != '')
{
cout << scotus[i][k];
k++;
}
cout << "\n";
}
Explanation:
scotus here is a two dimensional array. It contains names of 9 justices. so the loop starts from 0 and ends when i points to the last name element in the array. Then a while loop is used to check that name is longer than twenty characters and will keep on printing each output on the separate line.
Another way to write this:
for (int i = 0; i < 9; i++){
cout << scotus[i] << "\n";
}
This loop will keep on executing and printing the names of the nine justices at every iteration until it reaches the end of the array (last element of the array scotus).
Answer:
---- ----
Explanation:
1) Start
2) Rectangle: Read Length and Width.
3) Calculate
4) Print (Calculate)