The function is an illustration of loops.
Loop instructions are used to repeat operations
The function in Python, where comments are used to explain each line is as follows:
#This defines the function
def exclamation(myStr):
#This iterates through the string
for i in range(len(myStr)):
#This checks if the current character of the string is "i"
if myStr[i] == "i":
#If yes, this converts the string to a list
s = list(myStr)
#This replaces i with !
s[i] = '!'
#This gets the updated string
myStr = "".join(s)
#This returns the new string
return myStr
Read more about similar programs at:
https://brainly.com/question/22444309
why is computer virus called destructive program
Answer:
A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.
Viruses which are the most commonly-known form of malware and potentially the most destructive. A virus can do anything from erasing the data on a computer to hijacking a computer to attack other systems, send spam, or host and share illegal content.
Explanation:
The term 'computer virus' was first formally defined by Fred Cohen in 1983. Computer viruses never occur naturally because they are always induced by people. Once created and released, however, their diffusion is not directly under human control. After entering a computer, a virus attaches itself to another program in such a way that execution of the host program triggers the action of the virus simultaneously. It can self-replicate, inserting itself onto other programs or files, infecting them in the process. Not all computer viruses are destructive though. However, most of them perform actions that are malicious in nature, such as destroying data. Some viruses wreak havoc as soon as their code is executed, while others lie dormant until a particular event (as programmed) gets initiated, that causes their code to run in the computer. Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected email attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software. Some old viruses make sure that the "last modified" date of a host file stays the same when they infect the file.
Write technical term of following statements: a.The set of programs to perform specific task. b.A feature of computer which tells multi-functioning capability of computer. c.The first calculating machine designed for the manipulation of census data. d.The first computer programmer.
Answer:
a) Application software
d) Lady Augusta Ada Lovelace
b) (it may be versatility
With respect to using software to build a project network, the authors contention is that... Multiple choice question. Understanding the calculations used is vital to proper use. Software makes up for the need to understand the forward/backward pass calculations and is not necessary for a person to know the pass calculations.
Answer:
They should have a common start and end node, numbering activity aides clarity, and no "if-then" statements
When constructing a project network for a project with 25-100 tasks, a common industry practice is to
utilize the "yellow sticky" approach
What is the base value of the number system that consist of the digit set {0, 1, 2, 3, 4, 5, 6, 7}?
(a) Two
(b) Eight
(c) Sixteen
(d) Seven
Answer:
B. Eight because octal number system has eight elements
Which of these is an example of an IT career? (ik I'm trash at this kinda stuff)
Select all that apply
A
game designer
B
network engineer
C
graphic designer
D
cashier
Answer:
not d
Explanation:
IT is info tech, so it's most likly a or c(I'mma go witn c), but then again b is possible, but c still sounds most reasonable(I think)
What is spam? a type of virus that spreads from computer to computer through a network connection a type of virus that targets programs and files, and duplicates itself like a biological virus the process of using email to trick a user to share personal information an unwanted e-mail sent in bulk from people or organizations
Answer:
This is a pretty obvious answer.
An unwanted e-mail sent in bulk from people or organizations.
Explanation:
Đất trồng có tầm quan trọng như thế nào đối với đời sống của cây:
A. Cung cấp nước, dinh dưỡng
B. Giữ cây đứng vững
C. Cung cấp nước, oxy, dinh dưỡng và giữ cây đứng vững
D. Cung cấp nguồn lương thực
Answer:
C
Explanation:
When you call a method with a parameter list, the arguments in the argument list Select one: a. must be coded in the same sequence as the parameters b. must have data types that are compatible with the parameters c. have the same names as the parameters d. all of the above e. a and b only
Answer:
a and b only
Explanation:
If you have a function foo(int a, double b) { } you can call this as foo(x,y), just as long as x is an int and y is a double.
Which is not true about climatic normals?
Multiple choice question.
A)
They can differ from daily weather conditions.
B)
They are gathered at one location.
C)
They are averaged over a 30-year period.
D)
They describe average conditions.
Answer:
I think c is correct answer
Explanation:
hope it's help yu
14. Applying formatting using the commands in the ribbon is called style
(page layout, override, justification)
Answer:
Override
Explanation:
Hope this helps
who is the father of computer
Answer:
Charles babbage is the father of computer
Explanation:
Charles Babbage is a father of computer
Class C Airspace inner ring begins at the __________ and extends vertically (by definition) to MSL charted values that generally go up to ______________ feet above airport elevation and the outer ring begins at _______ feet above the ground and extend vertically to _________ feet above airport elevation. (NOTE #1: no commas) (NOTE #2: All values on the Sectional Charts are in MSL values)
Answer:
5 nautical mile
4000 feet
1200 feet
Explanation:
Class C Airspace has inner ring which is also an inner core has usually 5 nautical mile radius. This extends from surface area upto 4000 feet above airport elevation and outer ring starts at an altitude of 1200 feet above ground and is extended upto 4000 feet above airport elevation.
write the name of the technologies used in all five generation
Answer:
First Generation (1940-1956)
First Generation (1940-1956)Second Generation (1956-1963)
First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)
First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)Fourth Generation (1971-2010)
First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)Fourth Generation (1971-2010)Fifth Generation (Present Day)
Answer:
Five generation :Artificial intelligence _ Each one of the five generation computer is characterized by a major technological development .
Explanation:
Define Data communication
Explanation:
Data transmission and data reception is the transfer and reception of data over a point-to-point or point-to-multipoint communication channel. Examples of such channels are copper wires, optical fibers, wireless communication channels, storage media and computer buses.
how do I answer question
Answer:
To answer a question on brainly, there is a add answer button below the question. Please look at the attached, it shows you the add answer button.
Explanation:
Once you click on add answer, brainly will take you to something that looks like a note and all you have to do is type the answer and explanation. Once you do that, click on the add your answer button on the top right corner, and your answer will be posted.
Section A: A(n) is a collection of information, generally stored as computer files. The information it contains can be stored, updated, organized, output, distributed, searched, and analyzed. A filing cabinet full of folders and papers would be classified as a(n) file. A(n) file use
Answer:
A database is a collection of information, generally stored as computer files. The information it contains can be stored, updated, organized, output, distributed, searched, and analyzed. A filing cabinet full of folders and papers would be classified as an unstructured file. A structured file uses a uniform format to store data for each person or thin in the file
Explanation:
A database is a systematically structured collection of data or information that is usually digitally and electronically stored within an computer
Unstructured files are large number of files that are not stored based on structural properties, or kept in an organized format
Structured file are files that are keeps data in a uniform organized structural format
Pratibha is working in a bank. She is creating a database to store the details of the bank customers. Which of the following fields of table Bank_Customer can be selected as primary key?
Answer:
Acc_No
Explanation:
Given
See attachment for table Bank_Customer
Required
Which field can be used as primary key
A field, once made the primary key, cannot contain duplicate entries.
This means that Pratibha has to select a field that can be unique to all customers.
From the table, we have:
Acc_No [tex]\to[/tex] No two customers can have the same account number
Cust_Name [tex]\to[/tex] Multiple customers can have the same name
DOB [tex]\to[/tex] Multiple customers can have the same date of birth
PAN_NO [tex]\to[/tex] No two customers can have the same pan number; however, pan number is often issued by tax department of a country.
Opening_Bal [tex]\to[/tex] Multiple customers can have the same opening balance,
Hence, the field to use as primary key is:
Acc_No
Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and she must immediately pay $500 to have it renewed before control of the computer will be returned to her. What type of malware has infected her computer
Answer:
Blocking ransomware
Explanation:
A ransomware is a malware that acts by encrypting the files of a victim after which the attacker demands for a ransom payment to be made by the victim before access is restored through the provision of a key to decrypt the encrypted files
There are different types of ransomware such as blockers, wipers and cryptors
A blocker ransomware is one that blocks access to the files stored on a computer or device by encrypting them and usually displaying a demand for payment message that comes up in front of the all opened windows
NBA bank uses centralized client server database that is accessed by all its nationwide branches. All customers' records are stored on the database. There are no copies at the branches. The building that holds this database and all the equipment went up in flames and was destroyed.
Answer:
NBA bank data is completely destroyed since it has not maintained any backup.
Explanation:
All businesses should maintain backup of important records. NBA bank has centralized client server database. This database record should be backup at different system which is only accessed when there is some problem in the original data. The backup system is initiated when the original database is destroyed.
A simple circuit consists of a battery, an ammeter and a 2-ohm resistor. If the ammeter reads 4 amperes, determine the voltage of the battery and enter in the appropriate space.
Using ohms law
[tex]\boxed{\sf \dfrac{V}{I}=R}[/tex]
[tex]\\ \sf\longmapsto V=IR[/tex]
[tex]\\ \sf\longmapsto V=2(4)[/tex]
[tex]\\ \sf\longmapsto V=8V[/tex]
how do you take a screenshot on a Samsung tablet
Explanation:
to capture a screenshot press and hold the power and volume down button at the same time for approximately 2 seconds
1. Answer the following questions: a. What are the different types of number system? Name them.
Answer:
binary,decimal, hexadecimal and octal number system
why the internet is not policed
Answer:
The Internet allows people to circumvent law by committing criminal acts from areas where their activities are not illegal. Those areas will always exist, and thus new regulations will be just as ineffective as the old ones are ["Net Needs Law Enforcement, Author Says,"]. But Internet traffic is marked with IP addresses, and those addresses can be tied to specific networks with specific locations. Shouldn't it be possible to separate traffic based on the originating network and treat data coming from relatively insecure locations differently than data coming from relatively secure locations? It would be much harder for someone in a rogue nation to hack a network if he had to hack an intermediary network first. And unlike government regulation, which has zero impact in areas where these threats are likely to originate, separating traffic by location might actually work
16. Which of the following is true about function return statements? A) A function can hold multiple return statements, but only one return statement executes in one function call. B) A function can hold only one return statement. C) A function can hold multiple return statements, and multiple return statements can execute in one function call. D) A function can have maximum of two return statements.
Answer:
A) A function can hold multiple return statements, but only one return statement executes in one function call
Explanation:
This is because each function can only return one value, whether it be an integer, String, or other object.
However, you can have a series of if-else statements, or case statements, to return a different value depending on information (within parameters, or variables.
Excellent. So, you can have multiple return statements, but the function will only end up executing one of these return statements and return a single value.
Hope this helps!
The statement "When there are multiple return statements but one return statement should execute the 1 function call" is true.
The following information should be considered:
This can be done as every function has only a return i.e. one value. It can be an integer, string, or any other thing. The function can't hold only 1 return statement.The function can't hold many return statements that execute one function call. The function can't have the utmost 2 return statements.Therefore, we can conclude that option A is correct.
Learn more about the function here: brainly.com/question/12431044
What is a single physical processor? plz help
Answer:
A physical processor which is also referred to as a CPU, is a chip that is visible on a computer's circuit board.
Explanation:
you’ve found an image you want to insert into your slide presentation you want to make the image look more gray so that it looks like an older image what would you need to adjust
image grayscale
format : format options: recolor : then pick the color
the paint 3D program is used for drawing picture true or false
Answer:
The answer is TRUE we use paint program to draw.
Explanation:
#swag
which computer is used in hospital for ultrasound?
Answer:
Pentium Powered Computer
Explanation:
Pentium powered computer
4. Calculate the standard deviation for the following data set: Foundations of Technology Engineering byDesi OITEEA . . Data Set = 4, 14, 6, 2, 7, 12 217 ,
Answer:
[tex]\sigma_x = 5.68[/tex]
Explanation:
Given
[tex]x = 4, 14, 6, 2, 7, 12 2,17[/tex]
Required
The standard deviation
First, calculate the mean
[tex]\bar x =\frac{\sum x}{n}[/tex]
So, we have:
[tex]\bar x = \frac{4+ 14+ 6+ 2+ 7+ 12 +2+17}{8}[/tex]
[tex]\bar x = \frac{64}{8}[/tex]
[tex]\bar x = 8[/tex]
The standard deviation is:
[tex]\sigma_x = \sqrt{\frac{\sum(x - \bar x)^2}{n-1}}[/tex]
So, we have:
[tex]\sigma_x = \sqrt{\frac{(4 - 8)^2+ (14 - 8)^2+ (6 - 8)^2+ (2 - 8)^2+ (7 - 8)^2+ (12 - 8)^2+ (2 - 8)^2+ (17 - 8)^2}{8-1}}[/tex]
[tex]\sigma_x = \sqrt{\frac{226}{7}}[/tex]
[tex]\sigma_x = \sqrt{32.2857}[/tex]
[tex]\sigma_x = 5.68[/tex]
What is ABC computer?
Answer: The Atanasoff–Berry computer was the first automatic electronic digital computer. Limited by the technology of the day, and execution, the device has remained somewhat obscure. The ABC's priority is debated among historians of computer technology, because it was neither programmable, nor Turing-complete.
Explanation: