What are the missing words in the program?
divide(numA,numB):
numA/numB

Answers

Answer 1

If you just want to get the quotient of numA and numB from the function, it would look like this:

def divide(numA, numB):

   return numA/numB

If you want to get the quotient of numA and numB from the function and then print that value to the screen, it would look like this:

def divide(numA, numB):

   return numA/numB

print(divide(1,1))

You can replace those 1's with any number you want.

Answer 2

The missing words in the program are:

def divide(numA, numB):

  return numA/numB

If you want to get the quotient of numA and numB from the function and then print that value to the screen, it would look like this:

def divide(numA, numB):

  return numA/numB

print(divide(1,1))

What is program?

A computer program is a sequence or collection of instructions written in a programming language and executed by a computer. Software contains computer programs as well as documentation and other intangible components. Source code refers to a computer program in its human-readable form. Because computers can only execute native machine instructions, source code requires the execution of another computer program. As a result, using the language's compiler, source code can be converted to machine instructions. The resulting file is referred to as an executable. Source code may also be executed within the language's interpreter. If the executable is called, the operating system loads it into memory and starts a process.

To learn more about program
https://brainly.com/question/22654163

#SPJ2


Related Questions

What is a contact position ?

Answers

Answer:

the poses that connect the extremes in motion

Explanation:

If you pay a subscription fee to use an application via the internet rather than purchasing the software outright, the app is called a/an -- application.

Answers

Answer:

Software as a Service (SaaS)

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

Software as a Service (SaaS) can be defined as a cloud computing delivery model which involves the process of making licensed softwares available over the internet for end users on a subscription basis through a third-party or by centrally hosting it.

Hence, Software as a Service (SaaS) is an example of a cloud computing environment that provides users with a web based email service. Therefore, if you pay a subscription fee to use an application via the internet rather than purchasing the software outright, the app is called a Software as a Service (SaaS) application.

Some examples of SaaS applications are Salesforce, Google apps, Bigcommerce, Dropbox, Slack etc.

Hellpppp please I need it!

Answers

Answer:

1 you can transfer photos or files from one device to another

2 you can store photos or files so you save space on a device

3 not sure lol

Explanation:

Write a function named cube that accepts a number as an argument and returns the cube of that number. Write Python statement(s) that passes 3 to this function and prints returned value.​

Answers

def cube(num):

   return num*num*num

for the number 3:

def cube():

    return 3*3*3

Which Tab provides the command to add a hyperlink to a document?

Answers

Answer:

I love it is your responsibility is accepted the second one was for the database reply to your account we should wear the same same Dp xd I have tow bar is the only one hour u

Answer: The answer is Insert

Explanation:

the term technology is derived from the Chinese word. it is true or false​

Answers

Answer:

True

Explanation:

it's your perfect answers

Yes it is true
Its true

Write a Python program string_functions.py that defines several functions. Each function re-implements Python's built-in string methods.1. my_compare(str1, str2): Takes two strings as parameters (str1, str2) and 
returns a -1 if str1 is alphabetically less than str2, returns a 0 if str1 is alphabetically equal to str2, and returns a 1 if str1 is alphabetically greater than str2. 
2. is_char_in(string, char): Takes a string and a character as parameters and returns True if the character is in the string or False if it is not.3. is_char_not_in(string, char): Takes a string and a character as parameters and returns True if the character is NOT in the string or False if it is.4. my_count(string, char): Takes a string and a character as parameters and returns an integer count for each occurrence of the character. For example, if the function takes in 'abracadabra' and 'a', the function should return 5.5. my_endswith(string, char): Takes a string and a character as parameters and returns True if the character is the last character in the string or False if it is not. For example, if the function takes in 'quartz' and 'z', the function should return True. If the function takes in 'quartz' and 'q', the function should return False.6. my_find(string, char): Takes a string and a character as parameters and returns the first index from the left where the character is found. If it does not find the character, return -1. For example, if the function takes in ‘programming’ and ‘g’, it should return 3. Do not use str.find() for this.7. my_replace(string, char1, char2): Takes a string and two characters (char1 and char2) as parameters and returns a string with all occurrences of char1 replaced by char2. 
For example, if the string is ‘bamboozle’ and char1 is ‘b’ and char2 is ‘t’ then your function should return ‘tamtoozle’.8. my_upper(string): Takes a string as a parameter and returns it as a string in all uppercase. For example, 'victory' would be 'VICTORY'. Hint: Use the ord(c) function to get the ASCII / Unicode code-point. For example, ord('a') returns the integer 97. Use chr(i) function to convert an integer back to a character. For example, chr(97) returns the string 'a'. You cannot use the built-in string function str.upper() for this.9. my_lower(string): Takes a string as a parameter and returns it as a string in all lowercase. Hint: Similar to the previous item, use ord() and chr(). Do not use str.lower() for this. 
Extra Credit (10 points): my_title(string): Takes a string and returns a string with the first character capitalized for every word. For example, if the input to the function is "I like Python a lot", the function should return the string "I Like Python A Lot".Note- You may not use Python's built-in string methods - e.g., str.find(), str.replace(), str.lower(), lstrip(), startswith(), endswith(), join() … - to implement yours. However, you *should* use them to test your functions to see if they produce the same results. You can do this in the main or in another defined function which is called by the main. You can use all other Python functions.

Answers

Answer:

def my_compare(str1, str2):

   mylist = sorted([str1, str2])

   if str1 == str2:

       return 0

   elif str1 == mylist[0]:

       return -1

   elif str1 == mylist[1]:

       return 1

def is_char_in(string, char):

   if char in string:

       return True

   return False

def is_char_not_in(string, char):

   if char not in string:

       return True

   return False

def my_count(string, char):

   return string.count(char)

def my_endswith(string, char):

   return string.endswith(char)

def my_find(string, char):

   if char in string:

       return string.index(char)

   else:

       return -1

def my_replace(string, char1, char2):

   lst = [i for i in string]

   print(lst)

   for i, v in enumerate(lst):

       if v==char1:

           lst[i] = char2

   return "".join(lst)

Explanation:

Above are defined functions similar to the string built-in functions in python. To use them, type in the function name and pass in the required arguments. Save the file name as "string_functions" with a ".py" file extension and use the functions in other files by importing all the function as "import string_functions" or import individual functions with "from string_function import 'function_name' ".

Display all the lines in unixPasswd that contain at least 10 consecutive lowercase letters. How many names are there in total that meets this criteria?

Answers

Answer and Explanation:

To display 10 consecutive lower case letters in Unix, we make use of the commands below. The first command finds the letters in the file and the second command counts them line by line.

$ grep '[a-z]\{10,\}' /unixPasswd/passwd

# this command displays lines with at least 10 consecutive lowercase letters or more than 10 consecutive lowercase letters

$ grep '[a-z]\{10,\}' /unixPasswd/passwd | wc -l

# this command counts the number of lines that has at least 10 consecutive lower case letters or more than 10 consecutive lowercase letters

Note: the unixPasswd is a file in passwd file. The # is used when we want to add comments, is optional here. The $ is a prompt on the terminal that begins a new command.

what social media application that affect our day to day activities, and how did it improve our skill

Answers

Answer:

Instagram

it improved persons photoshop skills to put out better quality photos and videos and it can be an outlet for creative persons    

Identify at least three different tools or commands that can be used to determine the ports open on a computer. Explain what can be identified by these tools or commands and what can be done to protect against exploitation from these tools or commands.

Answers

Answer:

COMPUTERkdkwenfjknwejfkjbNT at G--

Explanation:

Select the statement which most accurately describes the benefits and drawbacks of working from home and telecommuting.

A) Workers can become more effective office managers but may make communication difficult.
B) Workers can work longer days than office workers but may set their own hours.
C) Workers can develop serious health issues but may eliminate their commutes.
D) Workers can collaborate over long distances but may become isolated.

Answers

Answer:

A one

Explanation:

A because workers may get hesitated in front of everyone but at home they will feel free

Answer:

Its probably D

Explanation:

It ask for a benefit and a drawback and the first one just does not make since but tell me if I'm wrong

Which IDS/IPS detection method uses previously gained connection attributes to match traffic against predetermined profiles

Answers

Answer:

Stateful protocol analysis detection.

Explanation:

IDS and IPS are acronym for intrusion detection system and intrusion prevention system respectively. IDS is a security system which monitors the network traffic and notifies the engineer when there's a malicious activity. IPS is a security system which monitors the network traffic and blocks malicious activity as well as keeping logs.

Generally, the detection methods used by the Intrusion Prevention Systems (IPS) are;

1. Statistical anomaly-based detection.

2. Signature-based detection.

3. Stateful protocol analysis detection.

Stateful protocol analysis detection is an IDS/IPS detection method that uses previously gained connection attributes to match traffic against predetermined profiles.

Basically, these predetermined profiles comprises of benign activities and suspicious activities that have been developed by industry leaders and vendors as abnormal systems or network behaviors.

hey yall wanna send me some just ask for my phone #

Answers

Answer:

Send you some what?

Explanation:

the answer is 12

what is soft copy output device?​

Answers

Answer:

A display device is the most common form of output device. It presents output visually on computer screen. The output appears temporarily on the screen and can easily altered or erased, it is sometimes referred to as soft copy also.

Explanation:

got it from googleeee

Its a java question and its so urget... thank you...

Answers

Answer:

ghv...................

plsss help me

1)give 2 examples of systems that you use or see in your day-to-day life​

Answers

Answer:

The modern world has numerous kinds of systems that influence daily life. Some examples include transport systems; solar systems; telephone systems; the Dewey Decimal System; weapons systems; ecological systems; space systems; etc.

Write a program that asks the user to input their first and last names. The first prompt should state:

Please input your first name:
The second prompt should state:

Please input your last name:
After accepting the inputs, your program should output the input in the form last name, first name.

Hint: Remember that you can concatenate (add) two phrases by using the + symbol. Don't forget that you'll need to add a comma as well and that the comma must be followed by a space.

Answers

first = input("Please input your first name: ")

last = input("Please input your last name: ")

print(last+", "+first)

I hope this helps!

develop an algorithm to compute and print out the average of 3 numbers A,B,C​

Answers

Answer:

Input: Take 3 numbers A, B and C

Processing: Find average of 3 numbers using formula: Average= A+B+C/3

Output: The output is Average of three numbers.

Explanation:

We need to write an algorithm to compute and print out the average of 3 numbers A,B,C​

An algorithm has Input, Processing and Output

The algorithm required is:

Input: Take 3 numbers A, B and C

Processing: Find average of 3 numbers using formula: Average= A+B+C/3

Output: The output is Average of three numbers.

100 points and brainlist....................................................................................................................................................................................................................... It Takes a Village! In every business, it takes more than one person to create success - whether you are talking about a berry farm, a historic theater, a popular amusement park, or an expanding coffee chain. While you watch the videos, notice how many different people work together to support and sustain these operations. Cogdell Berry Farm Fox Theatre Six Flags Jittery Joes Now, let's put it all together by creating a presentation entitled "It Takes a Village." Your presentation could either be a word document, a digital mind map, or a slideshow, but it must include a chart and research paragraph for each company. In your presentation, you should create a visual chart or slideshow featuring each company and highlighting at least two different jobs that are needed to keep each company running. Make it clear that each company is comprised of many different positions and discuss how people with different skills and interests work together to contribute to a successful enterprise. Finally, pick out one career from each video and do some additional research on it. Let's consult our handy reference, the Bureau of Labor Statistics' Occupational Outlook Handbook once again to find more information. This time check out the headings 'How to Become One,' 'Pay,' and 'Job Outlook' for each career you choose. Your presentation should include the following content: A chart/slideshow that describes each of the four companies with at least two jobs discussed in each company. In depth research on one job per company, including: How to Become One Pay Job Outlook However you choose to arrange your presentation, make sure to show clearly that the companies you learned about rely on more than one position to keep things running smoothly.

Answers

Answer:  what do i need to do Im confused I will edit my answer to answer correctly to help you Have a Nice day and that was a very nice trick

Explanation:

Answer:

give them brainliest :)

Explanation:

Select the correct navigational path to create the function syntax to use the IF function.

Click the Formula tab on the ribbon and look in the
gallery.

Select the range of cells.

Then, begin the formula with the
, click
, and click OK.

Add the arguments into the boxes for Logical Test, Value_if_True, and Value_if_False.

Answers

Answer:

wewewewewewe

Explanation:

wewe[tex]\neq \neq \neq \neq \neq \neq \neq \\[/tex]

Answer:

1. Logical

2.=

3.IF

Explanation:

JUST TOOK TEST GOOD LUCK!!!

Suppose that the host with IP address 10.0.1.19 sends an IP datagram destined to host 128.119.160.183. The source port is 3324, and the destination port is 80. I. Consider the datagram at step 1, after it has been sent by the host but before it has reached the NATted router. What are the source and destination IP addresses for this datagram

Answers

Answer:

The source and destination IP addresses are 10.0.1.19 and 10.0.1.25

Explanation:

NAT or network address translation is a network protocol is used by private networks to access the internet by assigning or mapping a public IP address to the private addresses.

The host with IP address 10.0.1.19 searches for the actual destination IP address 128.119.160.183 in its private network and when it does not find it, it sends the packet to the default gateway IP address 10.0.1.25, which is where the private IP address is NATted and sent to the destination.

Hello.

So I have been using this online therapist bot named Dr. Sbaitso, but recently his program has been very slow. Are there any alternatives for online therapists? I don't feel comfortable with video calling therapists or having a meeting with them, so that's why I am looking for a bot therapist thats free.

Answers

Answer:

:P

Explanation:

❤*: .。. o(≧▽≦)o .。.:*❤

What is the maximum throughput of a homogeneous pipeline in which four processors each handle one million instructions per second and processing a data item requires 50, 60, 40, and 30 instructions, respectively?

Answers

Explanation:

The maximum throughput is equal to the maximum number of data items processed per second cumulatively by all 4 processors.

Now, for a processor, the maximum data items processed per second

= (Number of instructions per second) / (Number of instructions per data item)

Thus, maximum data items processed per second for

processor 1 :

= (1,000,000) / (50)

= 20,000

processor 2 :

= (1,000,000) / (60)

= 16,666,67

processor 3 :

= (1,000,000) / (40)

= 25,000

processor 1 :

= (1,000,000) / (30)

= 33,333.33

Thus, cumulative throughput

= 20,000 + 16,666.67 + 25,000 + 33,333.33

= 95,000 data items per second

descriptive paragraph about a forest beside a lake

Answers

Luscious green leaves of the forest blew in the lukewarm winds of the day. The crystal waters of the lake just beside me reflected the forest in all its glory. The lake feel frigid, but the forest made me feel warm again. A sight to see, and a wonderful place to be was that gorgeous forest by the lake.

which program monitors the computer by looking for known trouble makers as well as suspicious behavior​

Answers

Answer:

i think spyware because spyware can collect almost any type of data, including personal information like internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with a user's control of a computer by installing additional software or redirecting web browsers.

Explanation:

Select all of the tips you should follow when creating a newsletter.

1. Make key text stand out with underlining or bolding.
2. Leave some white space or open space. Don't overcrowd the page.
3. Use one column for text.
4. Choose fancy fonts.
5. Select good quality graphics.
6. Know your audience.
7. Get to the point quickly. Be clear and concise.

Answers

Answer:

1. Make key text stand out with underlining or bolding.

2. Leave some white space or open space. Don't overcrowd the page.

5. Select good quality graphics.

6. Know your audience.

7. Get to the point quickly. Be clear and concise.

Answer:

1. Make key text stand out with underlining or bolding.

2. Leave some white space or open space. Don't overcrowd the page.

5. Select good quality graphics.

6. Know your audience.

7. Get to the point quickly. Be clear and concise.

Device A is attempting send data over the internet to device E which of the following is true of how the data will travel through the network

Answers

Answer:

so, if its a multiple question its better to give us the choices, but I know the info would go to a server and then the server would transport the info to the other computer.

Explanation:

Disregarding any references or pointers in data elements, i.e., the info components, how many null pointers are there in a properly maintained circular linked list that is not empty

Answers

Answer:

There are no null pointers.

Explanation:

Each element in a circular linked list points to exactly one other element, thus closing the loop and making it "circular".

examples of operating system from different families​

Answers

Answer:

windows from Microsoft Mac OS from Apple Ubuntu from chronicle

what are the names of different types of tablets

Answers

Answer:

iPad

IPad mini

IPad Pro

IPad air

Samsung Galaxy tab

Galaxy Tab e

galaxy tab pro

Galaxy tab 2

Explanation:

Also maybe could you look at my 3 biology questions i really need help

Other Questions
A circular lawn has a row of bricks around the edge. The diameter of the lawn isabout 40 feet.Question 13 ptsWhich is the best estimate for the amount of grass in the lawn?125 feet125 square feet1,250 feet1250 square feet All of the following are results/consequences of India's and China's anti-natalist policies EXCEPT: (which one below is NOT correct)A) both countries used contraception and propaganda to try and persuade people to have smaller familiesB) people in both countries experienced trauma due to the use of government forceC) both countries have a sex imbalance with more men than womenD) both countries were "unsuccessful" in slowing their population growth hellppppp please will give brainliest Please answer the questions!The ones that i answered were incorrect so pick the one that would be correct.Will give brainlist to first answer!!!!!!!!!!!!!!!!!!13 points!!!!!!! HELP ASAP DUE IN 5!!!!The points in each table lie on a line. Find the slope of the line.O 1/5O 1O 5O None of the above Which type of transformation is shown here?41O reflectionO translationO rotationO dilation Have you heard of keshis 2 soon and NIKIs lowkey? 2. How are the kelp and the chemosynthetic bacteria of thehydrothermal vents similar?A. Both use energy from the sun to make food.B. Both are primary producers.C. Both are scavengers.D. Both use hydrogen sulfide as an energy source. PLZ HURRY! WILL MARK BRAINLIESTWhich would be the best topic sentence for a paragraph about how to train a dog?This paragraph is about how to train dogs.Do you have a pet dog and a desire to train it?Training a dog requires patience and determination.Although people have all kinds of pets, dogs are the easiest to train. 1. John observed bacteria at 100X under the oil immersion and then decided to go back to 40Xobjective by raising the oil objective a little to avoid the damage to objective lens. Critique histechnique. (1 pt.) In what way were Jesuits and Ursulines similar?They provided Catholic education.They founded congregations for women.They encouraged active social roles for women.They traveled the world to provide aid to other nations. Which of these qualities is essential to an author's credibility?-popularity-correctness- trustworthiness-bias Why do software developers prefer to use high-level language to author programs?It can be used on computers without microprocessors.It prevents anyone from making changes to the software later.It uses a more English-like syntax.Its less complicated because it only uses zeros and ones. 2. A car travels at 65 miles/hr for 4.5 hours from Houston to Dallas. What is thedistance from Houston to Dallas? Read the excerpt from The Land. The way Ghost Wind had pulled back, I feared a ligament might be torn or even his leg fractured. "He all right?" asked Mitchell, on his feet now. Without looking at him, I shook my head. "Don't know. We got to get him back to the barn." "Your daddy's gonna kill me," he said solemnly, yet with no fear in his voice, just a voice of matter of fact. "Course now, my daddy get t' me first, he'll do it. Don't blame him this time if he do, though, 'cause he's gonna lose his job sure once your daddy see that horse." Which part of this excerpt shows intrinsic motivation? Mitchell is afraid that his father will punish him. Mitchell is afraid that Pauls father will punish him. Mitchell is worried that he has hurt Ghost Wind. Mitchell is worried about getting back to the barn. Write 5 sentences to ask your favorite person. Start those sentences with a pronoun or a verb. let's see who is smart enough to answer this if you get it right you will get 48 points and the Brainiest crown thing 15% of the cost of a computer was tax. If the tax was $180, what was the cost of the computer?A $1,000B $1,020C $1.200D $1.500 By reason of my tender age (and there are some critics who, I hope, will be satisfied by my acknowledging that I am a hundred and fifty-six next birthday) I could not understand what was the meaning of this night excursionthis candle, this tool house, this bag of soot. (On Being Found Out by William Makepeace Thackeray) What is one of the main economic roles financial institutions play?A. Collecting taxes for state and local governmentsB. Loaning money to businesses and consumersXc. Printing money to increase the money supplyD. Starting new businesses in many different industries