1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SCORPION-xisa [38]
4 years ago
12

Write a Python program to do the following:

Computers and Technology
1 answer:
viktelen [127]4 years ago
5 0

Answer:

(b)Tb = Ta[:3]

(c)Tc = Ta[-3:]

(d)Td = Tb + Tc

Explanation:

In order to generate random number in python, we need to first import random() function from random module

This function will generate a float number between 0 and 1, to make it between 1 and 15, we add 1 to the multiplication between the random number and the range differences

(a)

from random import random()

L = []

for i in range(10):

    L.append(1 + round(random()*14))

Ta = tuple(L)

(b) To copy the first 3 elements of tuple Ta, we simply go from : to 3

Tb = Ta[:3]

(c) To copy the last 3 elements of tuple Ta, we simply go from -3 to :

Tc = Ta[-3:]

(d) To concatenate the 2 tuples, we simply add them up

Td = Tb + Tc

You might be interested in
jakie krasnale mieszkaja we wroclawiu i opisz kto napisal kronike, prosze nie kopiowac dlugich tekstow najlepiej by bylo opisac
ASHA 777 [7]
Co kronika czytasz od?

6 0
4 years ago
If a form-based code is administered, then what does the administration section of the code specifically set forth?
Mamont248 [21]

Answer:

Form-based codes have a description of what uses a building or a place is permitted but focus on the physical character of construction, particularly how they relate to the public realm shared by everybody. More and more people across the country and around our world have seen form-based codes as a more effective and efficient method to accomplish what they want, protect what they care about and escape what they do not want.

Explanation:

In the 1980s a group of architects and designers were trying to construct an alternative to traditional zoning, focusing less on use and more on size, construction speed, the shape of public spaces and the connections between buildings. Throughout this time the Duany Plater-Zyberk & company was planned to create a new community based on traditional neighborhood design concepts, Seaside, Florida, which originally developed an earlier modern type code to direct the development of the new community. The entire municipal code of Seaside was graphically illustrated on one poster as a radical deviation from traditional zoning.

6 0
3 years ago
Identify an advantage of the software as a service (SaaS) approach in public cloud computing. Group of answer choices The user h
adell [148]

Answer:

The user does not need to purchase and install additional hardware to provide increased capacity.

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

Software as a Service (SaaS) can be defined as a cloud computing delivery model which involves the process of making licensed softwares available over the internet for end users on a subscription basis through a third-party or by centrally hosting it. Some examples of SaaS are Go-ogle apps, Bigcommerce, Salesforce, Slack, Dropbox, DocuSign, Microsoft Office 365, etc.

An advantage of the software as a service (SaaS) approach in public cloud computing is that the user do not have to purchase and install additional hardware to provide increased capacity because the software provider makes all of the necessary features for smooth operations and proper functioning available to the user.

7 0
3 years ago
What are some beginning keyboarding questions?
Assoli18 [71]

Answer:

What's the correct position to put your hands on the keyboard?

Explanation:

5 0
3 years ago
Read 2 more answers
Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injecti
givi [52]

The term vulnerability describes the issue that Adam discovered.

b. vulnerability

<u>Explanation:</u>

SQL injection attack is an attack in which an external party can execute SQL commands on the database that serves as a back-end for a particular website. The SQL commands can be used to modify the contents of the website, modify the records, delete the records, and retrieve confidential information as well.  

As Adam believes that the code has an issue that allows a SQL injection attack, the term that best describes the issue that he discovered is vulnerability. The website is vulnerable since the code does not have a proper procedure to tackle a situation of SQL injection attack.

7 0
3 years ago
Other questions:
  • This activity will help you meet these educational goals:
    7·2 answers
  • A _____ is a machine that changes information from one form into another.
    7·1 answer
  • Mateo could not find the undo command or shortcut. He should _____.
    15·2 answers
  • How many bytes of information can be stored on a hard drive?
    7·1 answer
  • What is a computer network?
    5·1 answer
  • Write a regular expression that selects lines containing any of the following words: linux windows solaris macos. For this exerc
    13·1 answer
  • To implement a small database, a database designer must know the "1" and the "M" sides of each relationship and whether the rela
    13·1 answer
  • According to the video, what is used to create computer programs?
    12·2 answers
  • What is a type of transition used for music in Earsketch
    11·1 answer
  • You are developing a Website that is going to be viewed extensively on smartphones and tablets. Which of the following should yo
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!