CODE THIS IN PYTHON PLEASE I NEED HELP BADLY
Ninety-Nine is a two-player card game played with a deck of 40-cards. The cards are labeled 0 – 9. To start, each player gets 3 cards and the remaining cards are placed face
down on the table (the pile). In an actual game, the point total is set to zero but for this program, an initial point total will be given. Cards are played in the order they are added to a player’s hand. Each player in turn puts down a card and changes the point total according to the point value of his card and then selects a card from the top of the pile. Each card adds its face value in points (e.g. a 5 is worth five points) to the point total except for certain cards that have special values or meanings:
1. A 9 is a pass (and does not change point total)
2. A 4 subtracts 10 points from the total
3. A 0 adds either 1 or 11 to the point total. The 11 is played first as long as it does not put
the point total over 99.
If a player plays a card that puts the total over 99, that player loses the game.
GET THE USER TO INPUT THE CARDS AND TOTAL POINT VALUE.
INPUT:

An input line will contain 11 integers. The first integer gives the initial point total. The next 3 integers will represent the 3 cards dealt to the player. The remaining integers will be, in order, the card picked by the player and the card played by the dealer.

OUTPUT:

Print the point total when the game ends and who won (player or dealer).

SAMPLE INPUT OUTPUT

87, 5, 8, 9, 7, 4, 6, 3, 9, 0, 2 101,dealer

78, 2, 4, 8, 3, 8, 5, 0, 6, 9, 8 100,dealer

95, 9, 0, 9, 0, 1, 0, 1, 0, 2, 5 100, player

65, 0, 8, 0, 7, 0, 6, 0, 5, 1, 4 105, dealer



Manual Sample run:

87, 5, 8, 9, 7, 4, 6, 3, 9, 0, 2

P P P P D P D P D P



Total = 87
Players turn 5 Total 92
Dealers turn 4 Total 82
Players turn 8 Total 90
Dealers turn 3 total 93
Players turn 9 pass total 93
Dealers turn 0 Total 94
Players turn 7 Total 101
Total 101, Dealer is the winner as the card value exceeded when player was dealing the card

Answers

Answer 1

numbers = input("Enter your numbers: (comma separated) ")

lst = numbers.split(",")

num_lst = ([])

for i in lst:

   num_lst.append(int(i))

total = num_lst[0]

num_lst.pop(0)

player_hand = ([num_lst[0], num_lst[1], num_lst[2]])

num_lst.pop(0)

num_lst.pop(0)

num_lst.pop(0)

dealer_hand = ([])

for w in num_lst:

   if num_lst.index(w) % 2 == 0:

       player_hand.append(w)

   else:

       dealer_hand.append(w)

is_player = True

zero_count = 0

while True:

   if is_player:

       if player_hand[0] == 9:

           total += 0

       elif player_hand[0] == 4:

           total -= 10

       elif player_hand[0] == 0:

           if total + 11  < 100 and zero_count == 0:

               total += 1

           else:

               total += 1

       else:

           total += player_hand[0]

       player_hand.pop(0)

       if total > 99:

           print("Total: {}. The dealer is the winner as the card value exceeded when the player was dealing the card.".format(total))

           break

       is_player = False

   elif not is_player:

       if dealer_hand[0] == 9:

           total += 0

       elif dealer_hand[0] == 4:

           total -= 10

       elif dealer_hand[0] == 0:

           if total + 11 < 100 and zero_count == 0:

               total += 1

           else:

               total += 1

       else:

           total += dealer_hand[0]

       dealer_hand.pop(0)

       if total > 99:

           print("Total: {}. The player is the winner as the card value exceeded when the dealer was dealing the card.".format(total))

           break

       is_player = True

I hope this helps!


Related Questions

Wii or Kinect sports games may provide _____ recreation to help stroke and injury victims recover faster. Smartphones often come with scaled-down versions of games such as _____ to introduce games to users. Role-playing, action, educational, and simulations are examples of computer and video game _____. Head-mounted displays often use organic light emitting diode, or _____, technology. Windows and Apple offer_____ , which contain tools for creating 2-D and 3-D drawings, game-playing interfaces, and multiplayer control.

Answers

Answer:

Therapeutic

Angry Birds

Subcategories

OLED

SDKs

Explanation:

Wii or Kinect sports games may provide Therapeutic recreation to help stroke and injury victims recover faster. Smartphones often come with scaled-down versions of games such as Angry Birds to introduce games to users. Role-playing, action, educational, and simulations are examples of computer and video game Subcategories. Head-mounted displays often use organic light emitting diode, or OLED, technology. Windows and Apple offer SDKs , which contain tools for creating 2-D and 3-D drawings, game-playing interfaces, and multiplayer control.

A Record is a group of related fields. a. TRUE b. FALSE
A Database Management Systems serves many applications by centralizing data and controlling redundant data. a. TRUE b. FALSE

Answers

A Record is a group of related fields. The statement "A Record is a group of related fields" is true. Regarding the statement "A Database Management System serves many applications by centralizing data and controlling redundant data," this statement is also true

In a database, a record is a collection of fields or attributes that are related to each other and represent a single entity or object. Each record in a database is typically unique and can be identified by a unique key. For example, in a student database, a record may contain fields such as student ID, name, age, and grade, where each field is related to the student entity.

. A Database Management System (DBMS) is a software system that allows users to store, retrieve, and manage data in a structured manner. One of the main advantages of using a DBMS is that it centralizes data, allowing multiple applications to access and manipulate the data efficiently. Additionally, a DBMS helps in controlling redundant data by providing mechanisms such as normalization to eliminate duplicate data and ensure data integrity.
In summary, a record is indeed a group of related fields, and a DBMS serves many applications by centralizing data and controlling redundant data.

To  know more about redundant data refer for:

https://brainly.com/question/30020503

#SPJ11

Reply to the comment with the following replace variation with variety

Answers

The term "variation" and "variety" may sound alike and similar but they have a different definition. Variation refers to the differences between individuals of the same species, while variety means the presence of many different types of something.

Hence, to replace "variation" with "variety," you will need to provide an explanation about different types of something.In a context where someone made a comment with the word "variation," you can reply using a phrase that uses the word "variety." For example, if the comment was, "I love the variation in colors in the sunset," you could reply, "I agree, the sunset's variety of colors is truly stunning.

It's amazing how different they can look each day. "When using the term "variety," it's essential to include a brief explanation to show the reader that you understand the definition of the word and how it relates to the context. Therefore, when using the phrase, you should aim for an explanation that is more than 100 words.

To know more about Variation visit:

https://brainly.com/question/11333978

#SPJ11

Which of the following tasks can you complete with ggplot2 features? Select all that apply.
A. Automatically clean data before creating a plot
B. Customize the visual features of a plot
C. Add labels and annotations to a plot
D. Create many different types of plots

Answers

The tasks that can be completed with ggplot2 features are: B. Customize the visual features of a plot, C. Add labels and annotations to a plot, and D. Create many different types of plots.

ggplot2 is a powerful data visualization package in R that provides a wide range of features for creating and customizing plots. It allows users to modify various visual aspects of a plot, such as colors, shapes, sizes, and themes, providing flexibility in designing visually appealing and informative plots. Additionally, ggplot2 allows for the addition of labels and annotations to enhance the understanding of the plot.

This includes adding axis labels, titles, legends, and text annotations to highlight important points or provide additional context. Furthermore, ggplot2 supports the creation of different types of plots, including scatter plots, bar charts, line graphs, histograms, and more, enabling users to represent and explore their data in various ways.

However, it's important to note that ggplot2 does not automatically clean data before creating a plot. Data cleaning tasks, such as removing missing values or outliers, are typically performed separately using other data manipulation techniques or packages before utilizing ggplot2 for visualization

Learn more about ggplot2 here: brainly.com/question/30558041
#SPJ11

given the amount and varied quality of information on the internet, what is one important learning goal for students when using newer technologies?

Answers

Given the vast and varying quality of information available on the internet, a crucial learning goal for students when using newer technologies is digital literacy. Digital literacy is defined as the ability to locate, evaluate, and apply digital information effectively. It is critical to prepare students for the fast-paced digital world we live in today. To achieve digital literacy, students need to learn how to evaluate online resources for authenticity, credibility, and reliability.

They must also learn how to protect their digital footprint by learning about online privacy, security, and responsible digital behavior. Another important learning goal is to teach students to communicate effectively and professionally online. This includes understanding the proper use of email, social media, and other online communication tools.

Finally, students must learn how to use technology tools to enhance their learning and productivity. This includes using online tools for research, project management, and collaboration. With the right digital literacy skills, students can effectively navigate the internet, use technology safely, and confidently apply the knowledge they have acquired through their learning experiences.

For more such questions on Digital literacy, click on:

https://brainly.com/question/14242512

#SPJ8

Describe four (4) data elements that must be captured
in an HRIS to enable users of the system to make the best use of
it. (20 Marks)
I needs this in 30 mins please

Answers

1. Employee Information: This includes capturing and storing details such as employee names, contact information, job titles, departments, and employment status. By having access to this information, users can effectively manage and organize employee data.

2. Payroll Information: An HRIS should capture payroll-related data, including employee salaries, wages, deductions, and benefits. By having access to this information, users can calculate accurate payroll, generate paychecks, and manage tax withholdings. Additionally, capturing payroll information allows users to analyze compensation trends and make informed decisions regarding salary adjustments or benefits offerings.

3. Performance Evaluations: It is essential to capture and store data related to employee performance evaluations. This includes performance ratings, feedback, and goals. By having this information readily available in an HRIS, users can assess employee performance, identify areas for improvement, and make informed decisions regarding promotions, training, or performance-related rewards.
To know more about employee visit:

https://brainly.com/question/33621442

#SPJ11

What would happen if you did not have a hard drive Installed on a computer? unable to use a keyboard no graphics no issues no permanent storage



I need answer asap I'll give lots of points ​

Answers

Answer:

No permanent storage

Explanation:

A hard drive stores information. Without one installed, there is no way for permanent storage to go. Thus, any permanent storage cannot be saved and disappears.

Answer:

No permanent storage

Explanation:

Write a go program that uses a struct that holds employee, hoursWorked,
and payPerHour. Create two variables of type struct (2 employees) and write a
function that calculates the two employee's paychecks. You may hardcode
values if you are using the web compiler

Answers

To write a Go program that uses a struct to hold employee, hours Worked, and pay Per Hour, and calculates two employees' paychecks:

1. Define a struct type called "Employee" with three fields: employee (string), hoursWorked (float64), and payPerHour (float64).
 
  ```go
  type Employee struct {
      employee     string
      hoursWorked  float64
      payPerHour   float64
  }
  ```

2. Create two variables of type "Employee" and initialize them with hardcoded values.
 
  ```go
  employee1 := Employee{
      employee:     "John",
      hoursWorked:  40,
      payPerHour:   10,
  }
 
  employee2 := Employee{
      employee:     "Jane",
      hours Worked:  35,
      pay Per Hour:   12,
  }
  ```

3. Write a function called "calculate Pay check" that takes an Employee parameter and calculates the paycheck by multiplying the hours Worked by the pay Per Hour.
 
  ```go
  func calculate Paycheck (employee Employee) float64 {
      return employee. hours Worked * employee. pay Per Hour
  }
  ```

4. In the main function, call the "calculate Pay check" function for each employee and store the results in variables.

  ```go
  func main() {
      paycheck1 := calculatePaycheck(employee1)
      paycheck2 := calculatePaycheck(employee2)
     
      // Print the paychecks
      fmt.Println("Employee 1's paycheck:", paycheck1)
      fmt.Println("Employee 2's paycheck:", paycheck2)
  }
  ```

5. Finally, run the program and it will display the calculated paychecks for both employees.

Make sure to import the "fmt" package at the top of your code to use the fmt.Println() function.

To know more about program refer to:

https://brainly.com/question/23275071

#SPJ11

Journal entry worksheet Record the sale of goods on January 1, 2021 in exchange for the long term note. Note: Enter debits before credits. Journal entry worksheet Record the interest accrual on December 31, 2021. Note: Enter debits before credits. Journal entry worksheet Record the interest accrual on December 31,2022. Note: Enter debits before credits. Journal entry worksheet Record the interest revenue in 2023 and collection of the note. Note: Enter debits before credits. On January 1, 2021, Wright Transport sold four school buses to the Elmira School District in exchange for the buses, Wright recelved note requiring payment of $517,000 by Elmira on December 31,2023 . The effective interest rate Is 8%. (FV of $1, PV of $1. EVA of $1, PVA of S1. EVAD of \$1 and PVAD of \$1) (Use appropriate factor(s) from the tables provided.) Required: 1. How much sales revenue would Wright recognize on January 1, 2021, for this transaction? 2. Prepare journal entries to record the sale of merchandise on January 1, 2021 (omit any entry that might be required for the cost of the goods sold), the December 31, 2021, interest accrual, the December 31, 2022, interest accrual, and receipt of payment of the note on December 31,2023 Complete this question by entering your answers in the tabs below. How much saies revenue would Wright recognize on January 1, 2021, for this transaction? (Round your final answer to nearest whole number;

Answers

On January 1, 2021, Wright Transport sold four school buses to the Elmira School District in exchange for a long-term note. The note requires Elmira to make a payment of $517,000 on December 31, 2023, with an effective interest rate of 8%.

To determine the sales revenue Wright would recognize on January 1, 2021, we need to calculate the present value of the note using the PV of $1 table. The formula to calculate present value is:

Present Value = Future Value / (1 + Interest Rate)^n
Using this formula, the present value of the note would be:
Present Value = $517,000 / (1 + 0.08)^2
Present Value = $477,314.81
Therefore, Wright would recognize sales revenue of $477,315 on January 1, 2021, for this transaction.
To know more about Transport visit:

https://brainly.com/question/29851765

#SPJ11

What programming languages can be used with the Virtual Brick? Virtual Robots 2 : Using Robot Virtual Worlds with Curriculum Launch the Virtual Brick software Choose Target Robot Virtual World Launch the LEGO MINDSTORMS EV3 Programming Software Download your program to the Virtual Brick

Answers

Answer:

The Virtual Brick programming language is EV3 which is an oversimplified beginner-friendly version of Python. It's a visual programming language by using block pieces.

Why would you want to minimize the Ribbon?

Answers

Answer:

When the Ribbon is minimized, you see only the tabs. There is no way to delete or replace the Ribbon with the toolbars and menus from the earlier versions of Microsoft Office. However, you can minimize the Ribbon to make more space available on your screen.

Write a program which displays a different random number between [lower, upper] whenever you run the program. Lower and upper are entered by the user during run-time. Note that lower must always be lesser than upper. If this condition is not satisfied, the user must be prompted to re-enter the values and only proceed if the specifications are met. The entire code is available online and you may submit that code. We shall use this code in future assignments and homework. It would be great if you can understand what's happening in the code.

Answers

Here's a Python program that generates a random number between a user-specified lower and upper bound:

python

Copy code

import random

while True:

   lower = int(input("Enter the lower bound: "))

   upper = int(input("Enter the upper bound: "))

   if lower < upper:

       break

   else:

       print("Invalid input! Lower bound must be lesser than upper bound. Please try again.")

random_number = random.randint(lower, upper)

print("Random number:", random_number)

The program starts by importing the random module, which provides functions for generating random numbers.

The program enters a while loop, which continues until the user enters valid input where the lower bound is lesser than the upper bound.

Inside the loop, the user is prompted to enter the lower and upper bounds. The input() function is used to read user input, and the int() function is used to convert the input to integers.

The program checks if the lower bound is less than the upper bound using an if statement. If the condition is met, the loop is exited using the break statement. Otherwise, an error message is displayed, and the loop continues to prompt the user for valid input.

Once the loop is exited, a random number is generated using the random.randint() function. This function takes the lower and upper bounds as arguments and returns a random integer within that range.

Finally, the program displays the generated random number.

This program allows the user to input a lower and upper bound and generates a random number within that range. It ensures that the lower bound is always lesser than the upper bound by validating user input. Understanding this code will help in future assignments and homework involving random number generation and user input validation.

To know more about Python visit

https://brainly.com/question/28248633

#SPJ11

The following data is entered into an Excel worksheet for a one-time investment: Annual Rate of Return, cell E1, 5.5% Investment Duration, cell E2, 10 Years Desired Future Value, cell E3, $400,000 Write a function that will calculate the amount of money that needs to be invested today in order to achieve the desired future value. Assume this investment will be made at the beginning of the first year. Write the function as if you were entering it into an Excel worksheet.

Answers

To calculate the amount of money that needs to be invested today to achieve a desired future value, you can use the Present Value (PV) function in Excel. By inputting the annual rate of return, investment duration, and desired future value into the PV function, you can determine the value.

To calculate the amount of money that needs to be invested today in order to achieve the desired future value, you can use the Present Value (PV) function in Excel. The formula to calculate the present value is:

=PV(rate, nper, pmt, [fv])

In this case, you want to find the present value, so you need to input the annual rate of return, investment duration, and desired future value into the formula.

Assuming the annual rate of return (5.5%) is entered into cell E1, the investment duration (10 years) is entered into cell E2, and the desired future value ($400,000) is entered into cell E3, you can use the following formula in Excel:

=PV(E1, E2, 0, E3)

This formula will calculate the amount of money that needs to be invested today (present value) in order to achieve the desired future value of $400,000. The fourth argument of the PV function, pmt, is set to 0 because there are no additional regular payments made during the investment duration.

By entering this formula into a cell in Excel, it will give you the amount of money that needs to be invested today.

To know more about Excel, visit

brainly.com/question/24749457

#SPJ11

Create an algorithm and flowchart that will accept name of user and display it.

Answers

Answer:

Algorithm

1.Start.

2.Using an input function, ask the user to input the name and store the Entered Value in string    variable.

3.Print value stored in String Variable.

4.End.

Flow chart:

which type of wireless technology increases bandwidth for a home wireless network by using multiple antennae for both the transmitter and receiver?

Answers

The type of wireless technology that increases bandwidth for a home wireless network by using multiple antennas for both the transmitter and receiver is called Multiple Input Multiple Output (MIMO) technology. It is a technology that uses multiple antennas at both ends of a wireless communication system to improve communication performance by transmitting multiple data streams simultaneously over the same channel.

MIMO technology increases the data transfer rate, improves signal strength and overall coverage of a Wi-Fi network.MIMO technology is based on a simple idea of adding more antennas to a wireless router or access point. This technology takes advantage of the fact that a wireless signal travels over multiple paths, with each path being reflected off obstacles in its way. MIMO technology exploits these multiple paths by using multiple antennas to send and receive multiple data streams simultaneously.MIMO technology can be implemented using different techniques such as Spatial Multiplexing, Beamforming, and Diversity. Spatial Multiplexing is the most commonly used technique in MIMO technology, which uses multiple antennas to transmit different data streams on the same frequency channel. Beamforming is a technique that uses multiple antennas to focus wireless signals in a specific direction, which improves the range and coverage of a wireless network.

Diversity is a technique that uses multiple antennas to provide better reception and reduce the impact of signal interference caused by other wireless devices or electronic equipment.MIMO technology is commonly used in the latest Wi-Fi standards such as 802.11n, 802.11ac, and 802.11ax, which provide faster data transfer rates and better wireless coverage compared to previous Wi-Fi standards. MIMO technology has become an essential part of modern Wi-Fi networks, allowing users to enjoy faster internet speeds and improved connectivity at home and in public places.

To know more about wireless technology visit:

https://brainly.com/question/14315635

#SPJ11

Technology assessment is often conducted by governmental offices or consultants to governments because legislation may be required to influence the direction of an emerging technology. Legislative action might include the following:

a. ordering companies not to produce a product

b. regulations, standards, safety measures, testing

c. picking the winning companies to produce the new product

d. closing the borders to imported technologies

Answers

When conducting technology assessment, governmental offices or consultants to governments often consider the need for legislation to influence the direction of an emerging technology. The correct option is a and b.

Legislative action that may be required can include the following:
a. Ordering companies not to produce a product: In some cases, if a product poses significant risks or has negative impacts on society, legislation may be implemented to prohibit companies from producing or distributing it.
b. Regulations, standards, safety measures, testing: Legislative action can also involve the establishment of regulations, standards, safety measures, and testing requirements for the emerging technology. This helps ensure that the technology is developed and used in a safe and responsible manner.

c. Picking the winning companies to produce the new product: While this is not a common approach, there may be instances where the government selects specific companies to produce an emerging technology. This could be done to promote domestic industry or to address national security concerns.
d. Closing the borders to imported technologies: In some cases, legislation may be implemented to restrict or prohibit the importation of certain technologies. This could be done to protect domestic industries, ensure national security, or address concerns about the technology's safety or impact.

To know more about technology refer to:

https://brainly.com/question/7788080

#SPJ11

Provide an example of why an organization might want to use the cloud for their sales and marketing software, and discuss why they might make that choice.

Provide an example of why an organization might not want to use the cloud for their Human Resources software and discuss why they might make that choice.

Answers

An organization might choose to use the cloud for their sales and marketing software for several reasons. Firstly, the cloud offers scalability, allowing businesses to easily expand or reduce their software usage based on their needs. For example.


Organization might choose not to use the cloud for their Human Resources (HR) software due to concerns related to data security and privacy. HR software often contains sensitive employee information, such as personal details, salaries, and performance reviews. Some organizations may feel more comfortable storing this data on their own servers to have full control over its security.

In summary, the cloud offers scalability, remote accessibility, regular updates, and cost savings for sales and marketing software, making it an attractive choice for many organizations. However, concerns regarding data security, compliance, and connectivity issues may lead organizations to opt for on-premises solutions for their HR software.

To know more about software visit:

https://brainly.com/question/32237513

#SPJ11

what table might the database need to help determine the balance field in the patient table? would you want to record when a bill is paid and the amount? how would the insurance part of the bill be recorded?

Answers

The payment date and amount fields would be used to track when a bill is paid and how much was paid. The insurance payment amount field would be used to record the portion of the bill that was paid by insurance.


When a patient receives a bill for healthcare services, the patient may be responsible for paying a portion of the total charge. This is typically referred to as the patient's "out-of-pocket" expenses. The insurance company may cover the remaining portion of the bill, depending on the patient's insurance coverage.


In order to record the insurance part of the bill, a separate field would be added to the billing table for insurance payment amount. This field would be used to record the amount that was paid by the insurance company. The balance field would be calculated based on the total charge minus the payment amount and insurance payment amount.

To know more about insurance visit:

https://brainly.com/question/989103

#SPJ11

Write a statement that outputs variable numObjects. End with a newline.
public class VariableOutput {
public static void main (String [] args) {
int numObjects;
numObjects = 15; // Program will be tested with values: 15, 40.
/* Your solution goes here */
}
}

Answers

To output the variable numObjects in Java, you can use the System.out.println() statement. Here's the solution to include in the provided code:

public class VariableOutput {

   public static void main (String [] args) {

       int numObjects;

       numObjects = 15; // Program will be tested with values: 15, 40.

       System.out.println(numObjects); // Outputs the value of numObjects

   }

}

The System.out.println() statement is used to display the value of numObjects on the console. By passing numObjects as an argument to System.out.println(), the value of numObjects will be printed. The statement is terminated with a newline character, which ensures that the output is followed by a line break.

Learn more about numObject here: brainly.com/question/14434701
#SPJ11

Is general purpose OS suitable to control chemical reactions and various other safety mechanisms in a chemical firm. Will it monitor the status of chemical reactions through various sensors ?

Answers

A general-purpose OS may not be suitable to control chemical reactions and various other safety mechanisms in a chemical firm.

A general-purpose operating system (OS) is a type of software that is designed to handle a wide range of computing activities. It is a software system that manages the hardware and software resources of a computer and allows the user to communicate with the computer and its hardware. The main goal of an OS is to provide a platform for running applications and controlling computer hardware.

The reason for this is that chemical reactions are very complex and require a high level of precision and control. A general-purpose OS is not designed to handle such complex tasks and may not be able to monitor the status of chemical reactions through various sensors. Additionally, chemical reactions involve hazardous materials that require specialized handling and monitoring. A general-purpose OS may not be able to provide the necessary level of security and control required for such hazardous materials.
To know more about operating system visit:

https://brainly.com/question/29532405

#SPJ11

Assign numMatches with the number of elements in userValues that equal matchValue. Ex: If matchvalue = 2 and uservals = [2, 2, 1, 2], then numMatches = 3. function numMatches = Findvalues(uservalues, matchvalue) % userValues: User defined array of values % matchValue: Desired match value arraysize = 4; % Number of elements in uservalues array numMatches = 0: % Number of elements that equal desired match value % Write a for loop that assigns numMatches with the number of % elements in uservalues that equal matchvalue.

Answers

The provided code defines a function called "Findvalues" that takes two input arguments: "uservalues" (an array of user-defined values) and "matchvalue" (the desired value to match).

The goal is to determine the number of elements in "uservalues" that equal "matchvalue" and assign this count to the variable "numMatches".To accomplish this, the code initializes "numMatches" to 0 and then utilizes a for loop to iterate through each element in "uservalues". Inside the loop, it checks if the current element is equal to "matchvalue" and increments "numMatches" by 1 if a match is found.

The implementation of the function is as follows:

function numMatches = Findvalues(uservalues, matchvalue)

   arraysize = numel(uservalues); % Number of elements in uservalues array

   numMatches = 0; % Number of elements that equal the desired match value

   % Iterate through each element in uservalues

   for i = 1:arraysize

       % Check if the current element is equal to matchvalue

       if uservalues(i) == matchvalue

           numMatches = numMatches + 1; % Increment numMatches

       end

   end

end

This function can be called with the appropriate arguments to determine the number of elements in "uservalues" that equal "matchvalue". For example, if "uservalues" is [2, 2, 1, 2] and "matchvalue" is 2, the function will return numMatches as 3.

Learn more about matchvalue here: brainly.com/question/15739286
#SPJ11

discuss why it is so important for all application builders to always check data received from unknown sources, such as web applications, before using that data

Answers

This practice ensures data integrity, security, and helps prevent potential vulnerabilities or malicious activities that could compromise the application or its users.

Application builders must prioritize data validation and sanitization when dealing with data from unknown sources for several reasons.

1. Data integrity: Verifying the quality, accuracy, and validity of incoming data is essential to maintain the integrity of the application. Unchecked data can contain errors, inconsistencies, or unexpected formats, leading to incorrect results or system failures. Validating data helps ensure that only reliable and usable information is processed.

2. Security considerations: Unknown sources pose potential security risks, such as injection attacks (e.g., SQL injection or cross-site scripting). By meticulously validating incoming data, application builders can prevent these types of attacks, which could lead to unauthorized access, data breaches, or manipulation of the application's functionality.

3. Vulnerability mitigation: Unverified data can exploit vulnerabilities within the application. It is crucial to examine and sanitize input to eliminate the risk of buffer overflows, code injection, or other malicious activities that could compromise the application's stability and security.

4. Compliance and regulatory requirements: Depending on the nature of the application, specific compliance standards may need to be met (e.g., GDPR, HIPAA, PCI-DSS). Validating and sanitizing data is often a mandatory practice to comply with these regulations, ensuring the privacy and protection of sensitive information.

By implementing robust data checking mechanisms, such as input validation, type checking, and encoding techniques, application builders can fortify their applications against potential risks, enhance user trust, and maintain a secure and reliable system overall.

To learn more about data  Click Here: brainly.com/question/21927058

#SPJ11

you are the it administrator for a small corporate network. the area around your office complex is under construction. the power company informed you that there may be short interruptions to the electrical service that could last up to 15 minutes. you need to add a ups to the workstation and monitor in office 1 so that work can be saved in the event of an outage. a ups protects against over- and under-voltage conditions. the battery included with the ups provides backup power in case the main power is lost. in this lab, your task is to: add a ups to your computer: plug the ups into the wall outlet and turn it on. plug the computer and monitor power cables into the appropriate ups outlets. plug the printer in to the appropriate ups outlets. connect the network cables through the ups to the computer. the cable from the wall connects to the in port. connect the usb cable to the ups and the computer. power on the monitor and then the computer. unplug the ups from the wall outlet. do the computer and monitor still have power?

Answers

The correct answer is that the computer and monitor will not have power after unplugging the UPS from the wall outlet. The reason is that a UPS protects against over- and under-voltage conditions, and the battery included with the UPS provides backup power in case the main power is lost. In this case, the IT administrator for a small corporate network needs to add a UPS to the workstation and monitor Office 1 so that work can be saved in the event of an outage.

Therefore, in this lab, the task is to add a UPS to the computer as follows:

Step 1: Plug the UPS into the wall outlet and turn it on.

Step 2: Plug the computer and monitor power cables into the appropriate UPS outlets. Also, plug the printer into the appropriate UPS outlets.

Step 3: Connect the network cables through the UPS to the computer. The cable from the wall connects to the in-port.

Step 4: Connect the USB cable to the UPS and the computer.

Step 5: Power on the monitor and then the computer.

After following these steps, the computer and monitor will have power as long as the UPS is connected to the wall outlet.

However, when the UPS is unplugged from the wall outlet, the computer, and monitor will not have power.

To know  more about UPS protects visit:

https://brainly.com/question/30666745

#SPJ11

You have created a new storage space using a single 500 GB external USB 3.0 drive. The drive is becoming full, so you add another external 1 TB USB 2.0 drive to the storage pool. Now that you have two drives, you would like to create a volume with storage space resiliency set to two-way mirror. You create the new volume with two-way resiliency and a size limit of 1 TB. As you are copying files from the C: drive to this new volume, you receive a warning that you are running out of space. Only a few hundred megabytes have been copied; why might you be receiving the warning so quickly? What can you do about it?

Answers

Answer:

In the clarification section following, the definition including its query is mentioned.

Explanation:

I believe we possess 2 other discs except for the major memory card-a USB 500 GB USB 3.0 drive, just one TB USB 2.0 drive. So we're making a two-array mirrored storage space resilience kit. We get a warning when we duplicate files from either the C: drive towards this second adaptation that you should be running out of places. That was because these need to have a backup process around each other discs throughout the situation of a two-way mirror.This serves to protect the organization from disc failure and enhances the overall efficiency of the device. Thus, even when copying, even though only several 100 MB has also been cut and pasted to something like the disc, the disc intercepts that the information collected from either the 500 GB drive as well as the major disc must be stored there. And that is how the alert arrives that throughout the new trip, we're running out of space. So this is how they so easily get the alarm.

garfield is a security analyst at triffid, inc. garfield notices that a particular application in the production environment is being copied very quickly, across systems and devices utilized by many users. what kind of attack could this be?

Answers

The situation described, where a particular application is being rapidly copied across systems and devices utilized by many users, could indicate a form of attack known as "malware propagation" or "worm attack."

A worm is a self-replicating malicious program that spreads across a network or multiple systems without requiring user interaction.

Worms exploit vulnerabilities in operating systems, applications, or network protocols to gain unauthorized access to systems and replicate themselves.

In this case, the rapid and widespread copying of the application indicates that it is likely infected with a worm.

When users execute the infected application, the worm is activated and starts spreading to other vulnerable systems.

The worm can utilize various means to propagate itself, such as exploiting network vulnerabilities, leveraging shared resources, or using social engineering techniques to trick users into executing the infected application.

The goal of a worm attack is to rapidly infect as many systems as possible, potentially causing disruption, stealing sensitive information, or creating a botnet for further malicious activities.

The quick and widespread distribution of the infected application is a key characteristic of worm attacks.

To mitigate this type of attack, it is crucial to promptly detect and contain the infected application.

This can involve isolating affected systems, updating security measures, patching vulnerabilities, and deploying antivirus or intrusion detection systems to identify and block worm propagation attempts.

For more questions on malware

https://brainly.com/question/2677233

#SPJ8


What are the 'three questions' marketers should highlight with
respect to web design?

Answers

Marketers should focus on three important questions when it comes to web design: Visual Appeal and User-Friendliness, Search Engine Optimization (SEO), Effective Communication of Brand Message.

With regards to website composition, there are a few significant inquiries that advertisers ought to address to guarantee a powerful and effective internet based presence. While it's not really restricted to only three inquiries, the following are three key inquiries that advertisers ordinarily center around:

Does the site have an outwardly engaging and easy to understand plan?

A stylishly satisfying web composition assumes a significant part in drawing in guests and keeping them locked in. It would be ideal for it to be outwardly engaging, predictable with the brand's personality, and simple to explore. The design ought to be instinctive, guaranteeing that clients can find the data they need rapidly and easily. Moreover, the site ought to be streamlined for various gadgets (responsive plan), guaranteeing a consistent client experience across work area, versatile, and tablet gadgets.

Is the site upgraded for web search tools (Web optimization)?

Having a very much planned site isn't sufficient on the off chance that it doesn't show up in web search tool results. Advertisers ought to guarantee that the site follows Search engine optimization best practices to work on its perceivability and natural rankings. This incorporates advancing page titles, meta depictions, headers, and integrating important watchwords into the substance. Furthermore, the site's construction ought to be web search tool well disposed, with legitimate URL structures, sitemaps, and quick page stacking speeds.

Does the site actually convey the brand's message and offer?

An effective site ought to plainly pass on the brand's message, exceptional selling focuses, and offer. Advertisers ought to zero in on creating convincing and powerful duplicate that draws in the ideal interest group and urges them to make wanted moves, like making a buy or pursuing a pamphlet. The site's substance ought to be enlightening, efficient, and outwardly upheld by applicable pictures, recordings, or infographics. Consistency in informing and it is likewise fundamental for brand all through the site.

To know more about Web design, visit

brainly.com/question/25941596

#SPJ11

When designing for mailing, which of the following is correct? Select all that apply. According to the Post Office requirements, PANTONE® colors must contain at least one part black. Paper thickness and size are up to the discretion of the designer. Bar codes will not workl if printed in reverse (white image with black background).

Answers

When designing for mailing, there are several correct considerations to keep in mind. According to Post Office requirements, PANTONE® colors must contain at least one part black. This ensures readability and legibility.

However, paper thickness and size are up to the discretion of the designer. It's important to choose a paper weight that is appropriate for mailing purposes and to follow any specific size guidelines provided by the Post Office. Additionally, it is true that bar codes will not work if printed in reverse, meaning a white image with a black background.

Bar codes need to have a high contrast to be accurately scanned. Therefore, it is best to print bar codes with a dark color on a light background. Remember to follow these guidelines to ensure that your mailing design meets the necessary requirements.

To know more about Bar codes refer for:

https://brainly.com/question/30651028

#SPJ11

this software can be used to access the internet anonymously, without providing the network you're connecting to with information identifying your computer or location:

Answers

The software that can be used to access the internet anonymously without providing the network that you are connecting to with information that identifies your computer or location is a Virtual Private Network (VPN). A VPN is a secure way to access the internet, which is designed to protect user privacy.

VPNs allow you to connect to the internet through an encrypted tunnel, which is a virtual path that keeps your data safe from prying eyes. The encryption ensures that your data is not tampered with and that it cannot be accessed by hackers, governments, or other entities that may be monitoring your internet activity. Additionally, a VPN can be used to bypass restrictions and censorship, allowing you to access websites and services that may be blocked in your country or region.To use a VPN, you need to download and install a VPN client on your device. The client then establishes a secure connection to a VPN server, which acts as a proxy between your device and the internet. Once connected, your device will be assigned a new IP address, which is the virtual location that identifies your device on the internet. With a VPN, your online activity is completely private, as your internet service provider and other third parties will not be able to track your browsing habits or monitor your online activities. In conclusion, a VPN is the best way to protect your online privacy and security. It enables you to browse the internet anonymously, securely, and without restrictions. With a VPN, you can connect to any network without fear of your data being compromised or intercepted by hackers. Moreover, VPNs offer a higher level of encryption, which is much more secure than using an ordinary connection.

To know more about internet visit:

brainly.com/question/13308791

#SPJ11

based on servicescape usage, a convenience store is a(n) environment. self-service vertical service remote service flexible service interpersonal services

Answers

Based on servicescape usage, a convenience store is a self-service environment. The servicescape is the environment in which the service is delivered to the customers, and it plays a critical role in influencing consumer perceptions, behavior, and decision-making.

The design of the servicescape can affect customers' emotions, perceptions of service quality, and willingness to purchase products or services.A convenience store is a type of retail store that is located in residential areas and is open for extended hours to cater to the customers' daily necessities, such as grocery items, toiletries, and snack foods. Convenience stores offer self-service, which means that customers are allowed to browse, choose, and pay for the products themselves, without any assistance from the staff. Self-service is one of the four categories of service delivery, which includes remote services, self-service, interpersonal services, and service encounters.

In self-service environments, customers take an active role in the service delivery process, which gives them more control over their experiences. The self-service model is often used by businesses to reduce labor costs, improve efficiency, and provide customers with a more convenient experience. Customers prefer self-service environments because they allow them to avoid interactions with staff, which can be time-consuming and stressful.Convenience stores have a well-designed servicescape that includes elements such as layout, lighting, color, music, and scent to create a relaxing and inviting atmosphere that encourages customers to stay longer and purchase more products. The servicescape design is tailored to meet the needs and preferences of the customers and create a positive experience.

To know more about servicescape visit:

https://brainly.com/question/32764867

#SPJ11

is defined as an act where the computer hardware, software, or data is altered, destroyed, manipulated, or compromised due to acts that are not committed with the intent to execute financial fraud. group of answer choices computer crime hacking phishing distributed denial of service (ddos)

Answers

Hacking is defined as an act where computer hardware, software, or data is altered, destroyed, manipulated, or compromised without the intent to execute financial fraud.

Hacking refers to gaining unauthorized access to computer systems, networks, or data with the intention of altering, destroying, manipulating, or compromising them. It involves exploiting vulnerabilities in computer hardware, software, or network security to gain unauthorized control or access. Hacking can be driven by various motives, such as curiosity, activism, or ethical purposes like identifying and fixing security vulnerabilities.

The other options listed are related to computer security threats but do not necessarily involve the alteration, destruction, manipulation, or compromise of computer hardware, software, or data without the intent to execute financial fraud.

Phishing refers to the fraudulent practice of obtaining sensitive information, such as passwords or credit card details, by disguising as a trustworthy entity in electronic communication. It aims to deceive individuals into revealing their confidential information.

Distributed Denial of Service (DDoS) attacks involve overwhelming a targeted system or network with a flood of internet traffic, rendering it unable to function properly and denying service to legitimate users.

Computer crime is a broad term encompassing various illegal activities committed using computers or computer networks. It can include hacking, fraud, identity theft, and other offenses.

While all the options mentioned are relevant to computer security, only hacking specifically involves the unauthorized alteration, destruction, manipulation, or compromise of computer hardware, software, or data without the intent to execute financial fraud.

To learn more about  Hacking Click Here: brainly.com/question/28311147

#SPJ11

Other Questions
Which of the following is likely to render a monopoly union more successful? relatively inelastic labor demand curve relatively elastic labor demand curve perfectly elastic labor demand curve a monopsony employer Module 3 Case Study Developing a Risk Response PlanA lot of effort goes into the preliminary work that leads to the project kick-off meeting. After developing the project schedule and planning project costs, quality management, etc., you are now ready to develop a risk response plan.Here are the risks you and your team have identified in the GCCG e-Banking Portal project: A potential project software upgrade. IT approval may occur during the project life cycle. Change in organizational requirements. Vicky Morris, the PMO Director, may resign. External consultant illness.1. The first risk has possible positive outcomes. Which risk response strategy should you employ and why?Answer:2. What are some responses you can plan for the potential risk of a project software upgrade during the project life cycle?Answer:3. The change in organizational requirements due to the resignation of Vicky Morris has possible negative outcomes to the project, but there is no way to avoid this scenario completely. Which risk response strategy should you employ and why?Answer:4. You determine that an external consultant illness cannot be avoided. Which risk responsestrategy should you employ and why?Answer:5. Summarize your findings from the research and reflect on them. Satyam and Shivam are playing a game. One of them codes a number and the other has to decode it. They use a part of the keyboard (shown below) for coding their messages. Using this coding system, Satyam asks Shivam to find out his phone number which he coded as symbols.Which of the following is his phone number? Jan Shumard, president and general manager of Danbury Company, was concerned about the future of one of the company's largest divisions. The division's most recent quarterly income statement follows:Sales $3,751,500Less: Cost of goods sold $2,722,400Gross profit $1,029,100Less: Selling and administrative expenses $1,100,000Operating (loss) $ (70,900)Jan is giving serious consideration to shutting down the division because this is the ninth consecutive quarter that it has shown a loss. To help him in his decision, the following additional information has been gathered: The division produces one product at a selling price of $100 to outside parties. The division sells 50% of its output to another division within the company for $83 per unit (full manufacturing cost plus 25%). The internal price is set by company policy. If the division is shut down, the user division will buy the part externally for $100 per unit. The fixed overhead assigned per unit is $20. There is no alternative use for the facilities if shut down. The facilities and equipment will be sold and the proceeds invested to produce an annuity of $100,000 per year. Of the fixed selling and administrative expenses, 30% represent allocated expenses from corporate headquarters. Variable selling expenses are $5 per unit sold for units sold externally. These expenses are avoided for internal sales. No variable administrative expenses are incurred. Required:1. Prepare an income statement that more accurately reflects the division's profit performance.2. Should the president shut down the division? What will be the effect on the companys profits if the division is closed Parent Company owns 90% of the outstanding capital stock of Sub Company. During 2021, Sub Company sold merchandise to Parent Company at a markup of 15% of selling price. The selling price of the merchandise sold during 2021 was 88000. At the end of the year, Parent Company had in its inventory onefourth of the goods purchased that year from Sub Company. Sub Company reported net income of 50000 in 2021. The noncontrolling interest in consolidated income to be reported for 2021 is please make it easy to understandMolander Corporation is a distributor of a sun umbrella used at resort hotels. Data concerning the next month's budget appear below: $ 29 $ 16 Selling price per unit Variable expense per unit Fixed ex example of equation with domain of (2, infinity) On October 1, 2019, Eugene Carr, the owner of a sporting goods store in Queens, N.Y., saw the following in a magazine: It was a sale of Extension Athletic Wear by Flom, Inc. It stated: "final sale - all items have - prices drop 40%. Upon reading this, Carr telephoned Joe Glom, the owner of Flom, Inc., which is a distributor of athletic warm-up suits. Carr said "I offer to buy 1000 pairs of Extension Athletic Wear warm-up suits for my store for $10,000. Acceptance to be received at my office by October 8." Flom replied, in a telephone conversation, "I am considering your offer, but I think the price is low. Would you consider a sales price of $12,000 ?" After a few seconds, Carr said "No, sorry. $10,000 is the offering price. Glom then said he would get back to Carr within the next 24 hours. On October 7, Glom sent a response by certified letter that stated: "I agree to your offer and will sell you the 1000 pairs of Extension Athletic Wear for $10,000." At the end of the business day on October 8 , Carr telephoned Flom and told him, that the "deal was off." Flom's letter accepting the offer was received by Carr on October 9th. The 1,000 pairs of Extension Athletic Wear were shipped, but upon seeing the goods, Carr refused to accept the goods and send them back, claiming that that the terms of his acceptance were not fulfilled. Glom claimed that no contract was made. Carr bought 1000 pairs of Extension Athletic Wear from another distributor. Flom subsequently commenced a lawsuit to recover money damages for breach of contract. 1. Was Carr's offer revoked when Glom said "Would you consider a sales price of $12,000 ?" Why or why not? Explain. (6 credits) 2. Was the offer revoked by the telephone conversation of October 8th? Why or why not? Explain. (8 credits) 3. Assuming the offer of October 1st was not revoked and still valid, was a contract created? Explain. (8 credits) 4. Let's change the facts. Let's say that Carr's offer on October 1 stated: "You (Flom) have until October 10th to accept ... and the offer is not revocable for 10 days." The offer is then revoked by Carr on October 4th by letter, which is received the next day. On October 6th, Flom telephones his acceptance to Carr. Has an agreement been made or has the offer been revoked? Explain. (6 credits) rubisco is the enzyme that catalyzes the first reaction in the calvin cycle. if a drug was added to a plant inhibited rubisco, would that affect the light reactions? w components of sexual intelligence include all of the following except: a. understanding oneself sexually. b. knowing others sexuality. c. having interpersonal sexual skills. d. having accurate scientific knowledge about sexuality and understanding the broader cultural contexts of sexual issues. 15. Suppose a chord is 20 inches long and is 24 inches from the center of the circle. Find the length of the radius. Leave your answer in simplest radical form. (Hint: Draw a picture!). (3 pts) 16. Suppose the diameter of a circle is 30 cm long and the distance from the chord to the center of the circle is 9 cm. Find the length of the chord. Leave your answer in simplest radical form. (Hint: Draw a picture!). (3 pts) 17. In circle O the radius is 36 cm long and mAB = 140. Find the length of AB. Leave it in your answer. Use the information in the table to calculate a consumer price index (CPI) and the inflation rate. The base year is 1975. Round answers to two decimal places. Market basket Quantity 1975 prices 1976 prices A dozen eggs 21 $0.50 $0.90 Calculator 11 $10.50 $14.00 Microwave oven 2 $130.00 $150.00 What is the CPI for 1975? 1.41 What is the CPI for 1976? 1.17 What is the inflation rate for 1976? % Required informationMiami Solar manufactures solar panels for industrial use. The company budgets production of 5,000 units (solar panels) in July and 5,300 units in August.Each unit requires 4 hours of direct labor at a rate of $16 per hour. Variable factory overhead is budgeted to be 70% of direct labor cost, and fixed factory overhead is $180,000 per month. Prepare a factory overhead budget for August. Can you please help me! ( Thank you so much! ). :) eonin and perotin are notable because they are the first important composers known by name. indicated definite time values and a clearly defined meter in their music. were the leaders of the school of notre dame. all answers are correct. The accounting process is correctly sequenced as a) Identification, communication, recording b) Recording, communication, identification c) Identification, recording, communication d) Communication, recording. Identification You have been instructed to create an aging schedule for ELMs accounts receivable using IDEA. For the purposes of this exercise, assume the aging begins on the date that the customer is invoiced and should only include valid accounts receivable (e.g., amounts not yet fully paid by the customer). You can assume that rounding differences on discounts taken by customers are considered to be fully paid. Your senior has instructed you to create a schedule with the following tranches: Current, 030 days delinquent, 3160 days delinquent, 60+ days delinquent.Required:Using the information above, complete all of the related steps shown below using IDEA. After completing each step, answer each question by supplying the required information. (Enter your answers exactly as they appear in IDEA. Dollar amounts should be entered into 2 decimal places.)What is the total amount of accounts receivable that are past due in less than 30 days? Recall that invoices are due n/30, thus they become past due 30 days after the invoice date. What is the present value at year zero for the cash flow of $12,000 received at year 1 at a discount rate of 10% ? a. $9,015.78 b. $12,000.00 c. $9,917.36 d. $10,909.09 e. None of the above What kind of a pronoun is "her" in the following sentence? Damian might go to the movies with her.a. subjectiveb. objectivec. possessive 6. Suppose that jerseys have demand function given byP=10010. This demand shows that:Price intercept is 10 and slope is 100.When P=90, 3 jerseys will be bought.When P=70, 7 jerseys