Answer:
Following are the Python program to this question: t=float(input("Enter time value in seconds: "))#input time in seconds by user
d = t // (24 * 3600) #calculate day and store in d variable t= t % (24 * 3600)#calculate time and store in t variable h = t // 3600#calculate hour and store in h variable t %= 3600#calculate time and store in t variable m=t // 60#calculate minutes and store in m variable t%= 60#calculate time and store in t variable s = t#calculate second and store in s variable print("day:hour:minute:second= %d:%d:%d:%d" % (d,h,m,s))#print calculated value
Output:
Enter time value in seconds: 1239876
day:hour:minute:second= 14:8:24:36
Explanation:
Description of the above can be defined as follows:
- In the above Python program code an input variable "t" is declared, which uses the input method to input value from the user end.
- In the next step, "d, m, and s" is declared that calculates and stores values in its variable and at the last print, the method is used to print its value.
Answer & Explanation:
Efficiency in the virtual world is closely related to that of the real world. In programming it is how fast an application run and robust(concise and small) it is coded. similarly efficiency is used when also explaining how fast you can manage your time while performing a task (like production). so in terms of similarity we will consider speed but for difference you may have to add other parameters when considering efficiency outside of programming.
Answer:
The best answer is "False
Explanation:
relational database uses a structure that allows us to identify and access data in relation to another piece organized into tables in the database.
Clustering similar records together is one way of reducing access time.
The qualities that are generally required are A. Vision
Answer:
Depends how bad you want to hide something. If the drive has previously been encrypted and the password hashed (like AES-256 with SHA-512 hashing), then deleting the content is enough since it will be slightly overridden and thus unusable. If it is not encrypted already, delete it, and override all your disk space with something. If you want it to die as a secrete 100%, burn it and pulverize it. Otherwise, if you want a quick method, use some real delete software.