answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksano4ka [1.4K]
2 years ago
5

Janeal spends her day looking at the stock and bond markets and evaluating how the portfolios of the businesses she serves will

do. What is Janeal’s career? Insurance Underwriter Insurance Sales Agent Financial Advisor Financial Analyst
Computers and Technology
1 answer:
pychu [463]2 years ago
4 0

Answer:

ur answer good sir will be : financial analyst

and a brainliest will be good to thnx

You might be interested in
What is Accenture's role in Multi-party Systems?
Maslowich

Answer:

helping a single company develop a data ingress platform

Explanation:

Accenture's role in Multi-party Systems is "helping a single company develop a data ingress platform."

This is evident in the fact that Accenture formed a strategic alliance with Marco Polo Network in recent times. The purpose of the alliance is to create a single data ingress platform for many connections. That is those on the network can easily install, either on-prem or through the cloud such as the Marco Polo platform, and then later incorporates the data into the enterprise resource planning system.

7 0
1 year ago
Given three dictionaries, associated with the variables, canadian_capitals, mexican_capitals, and us_capitals, that map province
Nookie1986 [14]

Answer:

The Python code to combine the three dictionaries are is given as follows:

  1. canadian_capital = {
  2.    cash: "SOME VALUES",
  3.    assets: "SOME VALUES"
  4. }
  5. mexican_capital = {
  6.    cash: "SOME VALUES",
  7.    assets: "SOME VALUES"
  8. }
  9. us_capital = {
  10.    cash: "SOME VALUES",
  11.    assets: "SOME VALUES"
  12. }
  13. nafta_capital = {
  14.    canadian: canadian_capital,
  15.    mexican : mexican_capital,
  16.    us: us_capital
  17. }

Explanation:

<u>Line 1 - 14 :</u>

Create three Python dictionaries and name them as <em>canadian_capitals, mexican_capital </em>and<em> us_capitals</em>. Please note a Python dictionaries should be enclosed in curly braces { }.  

We just define two samples of relevant keys (<em>cash </em>and <em>asset</em>) in each of the dictionaries. Python dictionary can map a key to a value.

Since we are not given any capital values from the question,  a dummy string "<em>SOME VALUES</em>" is tentatively set as the value for each of the keys.

In practice, we should replace those dummy strings with the real values of capital. The values can be a number, a string, a list and even a nested dictionary.

<u>Line 16 - 20 : </u>

Create one more Python dictionary and name it as <em>nafta_capital</em>.

Since our aim is to combine the three previous dictionaries (<em>canadian_capitals, mexican_capital </em>and <em>us_capitals</em>) and associate it with <em>nafta_capital</em>, we can define three different keys (<em>canadian, mexican </em>and <em>us</em>) in our dictionary nafta_capital.

As mentioned, a value associated with a key can be a nested dictionary. Hence, we just map <em>canadian_capitals, mexican_capital </em>and <em>us_capitals</em> as the value of the keys (<em>canadian, mexican </em>and<em> us</em>) in dictionary<em> nafta_capital,</em> respectively,

By doing so, we have managed to combine three target dictionaries (<em>canadian_capitals, mexican_capital </em>and <em>us_capitals</em> ) into a single dictionary, <em>nafta_capital</em>.

4 0
1 year ago
Mechanical advantage is the ratio of the force required to move a load divided by______
Veseljchak [2.6K]
I am not sure but i think it is 2 or 4 because a pc can withstand the power of volts, drive, ram, and data
3 0
2 years ago
8.Change the following IP addresses from binary notation to dotted-decimal notation: a.01111111 11110000 01100111 01111101 b.101
Andrews [41]

Answer:

a. 01111111 11110000 01100111 01111101 dotted decimal notation:

(127.240.103.125)

b. 10101111 11000000 11111000 00011101 dotted decimal notation: (175.192.248.29)

c. 11011111 10110000 00011111 01011101 dotted decimal notation:

(223.176.31.93)

d. 11101111 11110111 11000111 00011101 dotted decimal notation:

(239.247.199.29)

a. 208.34.54.12 class is C

b. 238.34.2.1 class is D

c. 242.34.2.8 class is E

d. 129.14.6.8 class is B

a.11110111 11110011 10000111 11011101 class is E

b.10101111 11000000 11110000 00011101 class is B

c.11011111 10110000 00011111 01011101 class is C

d.11101111 11110111 11000111 00011101 class is D

Explanation:

8 a. 01111111 11110000 01100111 01111101

we have to convert this binary notation to dotted decimal notation.

01111111 = 0*2^7 + 1*2^6 + 1*2^5 + 1*2^4 + 1*2^3 + 1*2^2 + 1*2^1 + 1*2^0

           = 0 + 1*64 + 1*32 + 1*16 + 1*8 + 1*4 + 1*2 + 1

           = 64 + 32 + 16 + 8 + 4 + 2 + 1

           = 127

11110000 = 1*2^7 + 1*2^6 + 1*2^5 + 1*2^4 + 0*2^3 + 0*2^2 + 0*2^1 + 0*2^0

               = 1*128 + 1*64 + 1*32 + 16 + 0 + 0 + 0 + 0

               = 128 + 64 + 32 + 16

               = 240

01100111 = 0*2^7 + 1*2^6 + 1*2^5 + 0*2^4 +0*2^3 + 1*2^2 + 1*2^1 + 1*2^0

               = 0 + 1*64 + 1*32 + 0 + 0 + 4 + 2 + 1

               = 64 + 32 + 4 + 2 + 1

               = 103

01111101   = 0*2^7 + 1*2^6 + 1*2^5+ 1*2^4 +1*2^3 +1*2^2 + 0*2^1 + 1*2^0

               = 0 + 1*64 + 1*32 + 1*16 + 1*8 + 1* 4 + 0 + 1

               = 64 + 32 + 16 + 8 + 4 + 1

               = 125

So the IP address from binary notation 01111111 11110000 01100111 01111101 to dotted decimal notation is : 127.240.103.125

b) 10101111 11000000 11111000 00011101

10101111 = 1*2^7 + 0*2^6 + 1*2^5 + 0*2^4 + 1*2^3 + 1*2^2 + 1*2^1 + 1*2^0

             = 175

11000000 = 1*2^7 + 1*2^6 + 0*2^5 + 0*2^4 + 0*2^3 + 0*2^2 + 0*2^1 + 0*2^0

                 = 192

11111000 = 1*2^7 + 1*2^6 + 1*2^5 + 1*2^4 +1*2^3 + 0*2^2 + 0*2^1 + 0*2^0

              = 248

00011101 = 0*2^7 + 0*2^6 + 0*2^5 + 1*2^4 +1*2^3 + 1*2^2 + 0*2^1 + 1*2^0

               = 29

So the IP address from binary notation 10101111 11000000 11111000 00011101  to dotted decimal notation is : 175.192.248.29

c) 11011111 10110000 00011111 01011101

11011111 = 1*2^7 + 1*2^6 + 0*2^5 + 1*2^4 +1*2^3 + 1*2^2 + 1*2^1 + 1*2^0

           = 223

10110000 =  1*2^7 + 0*2^6 + 1*2^5 + 1*2^4 +0*2^3 + 0*2^2 + 0*2^1 + 0*2^0

                = 176

00011111 = 0*2^7 + 0*2^6 + 0*2^5 + 1*2^4 +1*2^3 + 1*2^2 + 1*2^1 + 1*2^0

              = 31

01011101 = 0*2^7 + 1*2^6 + 0*2^5 + 1*2^4 +1*2^3 + 1*2^2 + 0*2^1 + 1*2^0

              = 93

So the IP address from binary notation 11011111 10110000 00011111 01011101 to dotted decimal notation is :223.176.31.93

d) 11101111 11110111 11000111 00011101

11101111 = 1*2^7 + 1*2^6 + 1*2^5 + 0*2^4 +1*2^3 + 1*2^2 + 1*2^1 + 1*2^0

            = 239

11110111 = 1*2^7 + 1*2^6 + 1*2^5 + 1*2^4 +0*2^3 + 1*2^2 + 1*2^1 + 1*2^0

           = 247

11000111 =  1*2^7 + 1*2^6 + 0*2^5 + 0*2^4 +0*2^3 + 1*2^2 + 1*2^1 + 1*2^0

              = 199

00011101 = 0*2^7 + 0*2^6 + 0*2^5 + 1*2^4 +1*2^3 + 1*2^2 + 0*2^1 + 1*2^0

               = 29

So the IP address from binary notation 11101111 11110111 11000111 00011101 to dotted decimal notation is : 239.247.199.29

9. In order to the find the class check the first byte of the IP address which is first 8 bits and check the corresponding class as follows:                

Class A is from 0 to 127

Class B is from 128 to 191

Class C is from 192 to 223

Class D is from 224 to 239

Class E is from 240 to 255

a. 208.34.54.12

If we see the first byte of the IP address which is 208, it belongs to class C as class C ranges from 192 to 223.

b. 238.34.2.1

If we see the first byte of the IP address which is 238, it belongs to class D as Class D ranges from 224 to 239.

c. 242.34.2.8

If we see the first byte of the IP address which is 242, it belongs to class E as Class E ranges from 240 to 255.

d. 129.14.6.8

If we see the first byte of the IP address which is 129, it belongs to class B as Class B ranges from 128 to 191.

10. In order to find the class of the IP addresses in easy way, start checking bit my bit from the left of the IP address and follow this pattern:

0 = Class A

1 - 0 = Class B

1 - 1 - 0 = Class C

1 - 1 - 1 - 0 = Class D

1 - 1 - 1 - 1 = Class E

a. 11110111 11110011 10000111 11011101

If we see the first four bits of the IP address they are 1111 which matches the pattern of class E given above. So this IP address belongs to class E.

b. 10101111 11000000 11110000 00011101

If we see the first bit is 1, the second bit is 0 which shows that this is class B address as 1 0 = Class B given above.

c. 11011111 10110000 00011111 01011101

The first bit is 1, second bit is 1 and third bit is 0 which shows this address belongs to class C as 110 = Class C given above.

d. 11101111 11110111 11000111 00011101

The first bit is 1, the second bit is also 1 and third bit is also 1 which shows that this address belongs to class D.

3 0
1 year ago
#Write a function called string_finder. string_finder should #take two parameters: a target string and a search string. #The fun
adoni [48]

Answer:

I am writing a Python program:

def string_finder(target,search): #function that takes two parameters i.e. target string and a search string

   position=(target.find(search))# returns lowest index of search if it is found in target string

   if position==0: # if value of position is 0 means lowers index

       return "Beginning" #the search string in the beginning of target string

   elif position== len(target) - len(search): #if position is equal to the difference between lengths of the target and search strings

       return "End" # returns end

   elif position > 0 and position < len(target) -1: #if value of position is greater than 0 and it is less than length of target -1

       return "Middle" #returns middle        

   else: #if none of above conditions is true return not found

       return "not found"

#you can add an elif condition instead of else for not found condition as:

#elif position==-1    

#returns "not found"

#tests the data for the following cases      

print(string_finder("Georgia Tech", "Georgia"))

print(string_finder("Georgia Tech", "gia"))

print(string_finder("Georgia Tech", "Tech"))

print(string_finder("Georgia Tech", "Idaho"))

Explanation:

The program can also be written in by using string methods.

def string_finder(target,search):  #method definition that takes target string and string to be searched

       if target.startswith(search):  #startswith() method scans the target string and checks if the (substring) search is present at the start of target string

           return "Beginning"  #if above condition it true return Beginning

       elif target.endswith(search):  #endswith() method scans the target string and checks if the (substring) search is present at the end of target string

           return "End" #if above elif condition it true return End

       elif target.find(search) != -1:  #find method returns -1 if the search string is not in target string so if find method does not return -1 then it means that the search string is within the target string and two above conditions evaluated to false so search string must be in the middle of target string

           return "Middle"  #if above elif condition it true return End

       else:  #if none of the above conditions is true then returns Not Found

           return "Not Found"

6 0
1 year ago
Other questions:
  • A(n) _____ can be used to reveal a competitor’s program code, which can then be used to develop a new program that either duplic
    9·1 answer
  • Is used to process certificates and private/public key information?
    12·1 answer
  • Copy the 10 statements as they appear below into your journal.
    6·2 answers
  • Given: an int variable k, an int array current Members that has been declared and initialized, an int variable memberID that has
    11·1 answer
  • You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users
    14·1 answer
  • In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target fr
    14·1 answer
  • What is the Gain (dB) of a transmission if the Maximum Data Rate is 1 Gbps and the Bandwidth =7000 MHz? Group of answer choices
    6·1 answer
  • To play game, go inside the Grand Theft Auto V folder and right click and runGTAVLauncher as administrator.If you get any missin
    5·1 answer
  • For a data structure, such as a stack, who is responsible for throwing an exception if the stack is empty and a pop() is called:
    13·1 answer
  • Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!