Answer:
Explanation:
The following code is written in Python. It asks the user for an input. Then cleans the input using regex to remove all commas, whitespace, and apostrophes as well as making it all lowercase. Then it reverses the phrase and saves it to a variable called reverse. Finally, it compares the two versions of the phrase, if they are equal it prints out that it is a palindrome, otherwise it prints that it is not a palindrome. The test case output can be seen in the attached picture below.
import re
phrase = input("Enter word or phrase: ")
phrase = re.sub("[,'\s]", '', phrase).lower()
reverse = phrase[::-1]
if phrase == reverse:
print("This word/phrase is a palindrome")
else:
print("This word/phrase is NOT a palindrome")
Answer:
-
= 1
= 1
Explanation:
Argon atom has atomic number 18. Then, it has 18 protons and 18 electrons.
To determine the quantum numbers you must do the electron configuration.
Aufbau's principle is a mnemonic rule to remember the rank of the orbitals in increasing order of energy.
The rank of energy is:
1s < 2s < 2p < 3s < 3p < 4s < 3d < 4p < 5s < 4d < 5p < 6s < 4f < 5d < 6p < 7s < 5f < 6d < 7d
You must fill the orbitals in order until you have 18 electrons:
- 1s² 2s² 2p⁶ 3s² 3p⁶ : 2 + 2 + 6 + 2 + 6 = 18 electrons.
The last electron is in the 3p orbital.
The quantum numbers associated with the 3p orbitals are:
= 1 (orbitals s correspond to
= 0, orbitals p correspond to
= 1, orbitals d, correspond to
= 2 , and orbitals f correspond to
= 3)
can be -1, 0, or 1 (from -
to +
)
- the fourth quantum number, the spin can be +1/2 or -1/2
Thus, the six possibilities for the last six electrons are:
- (3, 1, -1 +1/2)
- (3, 1, -1, -1/2)
- (3, 1, 0, +1/2)
- (3, 1, 0, -1/2)
- (3, 1, 1, +1/2)
- (3, 1, 1, -1/2)
Hence, the correct choice is:
-
= 1
= 1
Answer:
the binary code for "5" is 00000101
Answer:
TRUE
Explanation:
A rootkit is a collection of computer software, typically malicious, that is designed to grant an unauthorized user access to a computer or certain programs. Once a rootkit is installed, it is easy to mask its presence, so an attacker can maintain privileged access while remaining undetected.
Rootkit detection is difficult because a rootkit maybe able to subvert the software that is intended to find it.
Rootkits work by using a process called modification (the changing of user account permissions and security).
Rootkits are not malware themselves, but rather a process used to deploy malware on a target.
Therefore, it is TRUE that a rootkit is software and file folders that are hidden from view and permit viruses, spyware, and malware to be installed on a PC without the knowledge or consent of a user.