1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lord [1]
3 years ago
15

Задача 1: Ракета на старт

Computers and Technology
1 answer:
White raven [17]3 years ago
8 0

Answer:

(•‿•) this is not Россия server

You might be interested in
A lottery ticket contains five unique numbers. A set of unique numbers does not contain repeated elements. The winning combinati
RSB [31]

Answer:

Answer explained below

Explanation:

I have given two approaches in implementing the solution.

1. Using the for loop, in which you have to iterate over all the elements in list 1 and check in list 2

2. Use the set intersection method. As intersection will give u the common elements. And we can get there length by using len method.

I have added the code along with the snapshot and inline comment for the ease of you to understand. Please check the methods below. You can use either of them.

METHOD-1:

********** CODE *****************

def matches(tickets,winner):

tickets = set(tickets)

winner = set(winner)

counter = 0 #To Count the common elements

for i in tickets: # Iterate over all the elements in tickets.

if i in winner: # Check the element in the winner list

counter = counter+1

return counter

METHOD -2:

********** CODE ********************

def matches(tickets, winner):

tickets = set(tickets)

winner = set(winner)

return len(tickets.intersection(winner))

6 0
3 years ago
Most presentation programs allow you to save presentations so they can be viewed online by saving them as ____
Elza [17]

Explanation:

Most presentation programs allow you to save presentations so they can be viewed online by saving them as html

files.

5 0
3 years ago
Read 2 more answers
Pendant Publishing edits multi-volume manuscripts for many authors. For each volume, they want a label that contains the author'
lbvjy [14]

Answer:

Check the explanation

Explanation:

Pseudocode For Reading File:

start

Declarations

InputFIle records.txt

OutputFile result.txt

string authorName

string title

int numOfVol

open InputFile

open OutputFile

input authorName, title, numOfVol from records.txt

while not eof

output authorName

output title

output numOfVol

end while

close records.txt

close results.txt

END

The flowchart for reading the file can be seen below.

3 0
4 years ago
Based on the Standards, the statement, "Competition for computer time during periods of high demand had become intense because o
frozen [14]

Answer:

cause

Explanation:

According to my research, I can say that based on the information provided within the question this is an example of a "cause". This refers to something that makes something else happen, and is usually stated by the word "because". For example in this situation the a "planned increase in the use of the computer by operating departments" caused a "Competition for computer time during periods of high demand to become intense".

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

3 0
4 years ago
Which is a description of phishing?
kodGreya [7K]

Answer:

C. sending emails impersonating legitimate companies in an attempt to learn a recipient's personal information

7 0
3 years ago
Other questions:
  • What kind of firewall can block designated types of traffic based on application data contained within packets?
    7·1 answer
  • Two students are discussing the flow of electricity. Student A says that voltage is a measure of the amount of electron flow in
    8·1 answer
  • Energy is defined as stored energy
    13·2 answers
  • You can install several printers on your machine, but at least one must be the _______ printer.
    6·1 answer
  • 50 POINTS!!!!
    8·1 answer
  • Which system utility can you use to troubleshoot a computer that's slow to start by enabling or disabling startup programs?
    7·2 answers
  • RFID tags uses memory that is read-only.A. TrueB. False
    5·1 answer
  • Good ways to increase sales on phone accesories?
    10·2 answers
  • 11. Its collection of toys which could be used in the game via an implanted RFID chip made Activision’s game _______ one of the
    7·2 answers
  • The technique helps you explore possible risks by providing access to risk areas identified in the past. It also provides the so
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!