1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harkovskaia [24]
2 years ago
6

The process of learning by making mistakes and by trial and error is called _____.

Computers and Technology
1 answer:
vodomira [7]2 years ago
6 0
I believe it’s problem solving.
You might be interested in
Write a program that reads the contents of the two files into two separate lists. The user should be able to enter a boy’s name,
insens350 [35]

Answer:

Check Explanation.

Explanation:

A programming language is used by engineers, technologists, scientists or someone that learnt about programming languages and they use these programming languages to give instructions to a system. There are many types for instance, c++, python, Java and many more.

So, the solution to the question above is given below;

#define the lists

boyNames=[]

girlNames=[]

#open the text file BoyNames.txt

with open('BoyNames.txt','r') as rd_b_fl:

boyNames=rd_b_fl.readlines()

boyNames=[name.strip().lower() for name in boyNames]

#open the text file GirlNames.txt

with open('GirlNames.txt','r') as rd_b_fl:

girlNames=rd_b_fl.readlines()

girlNames=[name.strip().lower() for name in girlNames]

#print the message to prompt for name

print('Enter a name to see if it is a popular girls or boys name.')

while True:

#prompt and read the name

name=input('\nEnter a name to check, or \"stop\" to stop: ').lower()

# if the input is stop, then exit from the program

if name=='stop':

break

# If the girl name exits in the file,then return 1

g_count=girlNames.count(name)

# if return value greater than 0, then print message

if g_count>0:

print(name.title()+" is a popular girls name and is ranked "

+str(girlNames.index(name)+1))

# if return value greater than 0, then print message

#"Not popular name"

else:

print(name.title()+" is not a popular girls name")

## If the boy name exits in the file,then return 1

b_count=boyNames.count(name)

if b_count>0:

print(name.title()+" is a popular boys name and is ranked "

+str(boyNames.index(name)+1))

# if return value greater than 0, then print message

#"Not popular name"

else:

print(name.title()+" is not a popular boys name")

3 0
3 years ago
A company that designs video games has decided to expand and needs to hire Software Developers, Web Administrators, and Computer
choli [55]
Collage graduates that are currently jobless or looking to apply for a jod
8 0
2 years ago
Read 2 more answers
Gleick believes that the book is
ss7ja [257]

That it is a tool that does its job well, it's a technology that works.

6 0
3 years ago
Which two settings must you configure when fortigate is being deployed as a root fortigate in a security fabric topology?
Goryan [66]

The two settings that one must configure when fortigate is being deployed as a root fortigate in a security fabric topology are:

  • Option A. Enables you to view the logical and physical topology of Security Fabric devices.
  • Option  C. Enables you to view the security ratings of FortiGate Security Fabric groups.

<h3>What is security fabric settings?</h3>

The term Security Fabric is known to be a tool that aids one or allows one's network to be able to automatically see and also dynamically isolate any kinds of affected devices.

Note that is one that can also partition network segments, update rules, and they can bring out new policies, and delete malware.

Hence, The two settings that one must configure when fortigate is being deployed as a root fortigate in a security fabric topology are:

  • Option A. Enables you to view the logical and physical topology of Security Fabric devices
  • Option  C. Enables you to view the security ratings of FortiGate Security Fabric groups.

See full question below

Which two Security Fabric features are on FortiManager? (Choose two.)

Select one or more:

A. Enables you to view the logical and physical topology of Security Fabric devices

B. Enables you to run security rating on FortiGate devices

C. Enables you to view the security ratings of FortiGate Security Fabric groups

D. Enables you to view and renew Security Fabric licenses for FortiGate devices

Learn more about security from

brainly.com/question/25720881

#SPJ1

8 0
2 years ago
What are the uses of DVD Ram​
Verdich [7]

Answer:

Like ordinary random access memory (RAM), it can be repeatedly read, written to, and erased. Intended mostly for removable computer storage, DVD-RAM provides the capabilities of Rewriteable CD (CD-RW) - users can run programs from the discs, copy files to them and rewrite or delete them.

4 0
2 years ago
Read 2 more answers
Other questions:
  • A bit shift is a procedure whereby the bits in a bit string are moved to the left or to the right. For example, we can shift the
    12·1 answer
  • Students recently created a Gaming Club at their school. On Friday of every week, students bring in their gaming consoles (Xbox,
    10·1 answer
  • Odbc works on the ____ operating system.
    5·1 answer
  • Double clicking a word selects the entire word?
    10·1 answer
  • What can search the Internet and select elements based on important words?
    6·2 answers
  • What are the two categories of problems that we can simply convert<br> to parallel code?
    10·1 answer
  • Implementing an interface means that you are adding to your class any mechanisms defined in an abstract class. Your class essent
    12·1 answer
  • File-sharing utilities and client-to-client communication applications can provide the capability to share files with other user
    14·1 answer
  • Explain how loops can be utilized in list processing. Please provide Python examples in your response.
    7·1 answer
  • A license may limit the use of a software application to a specific device. Group of answer choices True False
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!