Forum Replies Created
- AuthorPosts
Chien493
ParticipantI learned how to do some simple calculations with python. this class is really fun. i want do more on python.
Chien493
Participantyes
yes
Arguments must be given in the order expected by the functionChien493
ParticipantPrint the answer you enter the number. The int() function converts the specified value into an integer number.
Chien493
Participant1)[“Abbot”, 78, 89, “Barrava”,97,86]
2)for x in gradebook:
print(x, end = ” “)
3)print((gradebook[1]+gradebook[2])/2)
print(gradebook[0]+gradebook[3])
print(gradebook[2]+gradebook[3])output, Abbot 78 89 Barrava 97 86
Chien493
ParticipantCentral processing unit- Unable to fetch instructions and execute them to process instructions.
storage- There will be insufficient memory.
peripheral equipment- user can’t to interact with the computer.Chien493
ParticipantBoth MacOS and Windows 10 have clear and perfect tips. Both systems provide a secure login option. You can easily log in to Mac with your fingerprint. You can easily log in to Mac with your fingerprint. But Windows 10 face login, fingerprint reader can also use PIN to log in. Apple provides some computer hardware options, but Windows common printers, scanners, office equipment and some relatively new devices can run Windows provides more options for the use of system hardware configuration. Windows PCs have more malware than Macs including ransomware, spyware, botnets and old-fashioned viruses. My favorite is Microsoft Windows.
My favorite is Microsoft Windows.Chien493
ParticipantReplace a sequence of repeated identical data in the file with a count and single data ex: aaabbcddddd After RLE compression *3a *2b c *5d
Chien493
Participanta file compression become smaller file. Save space on computer hard disk.
Lossy compression will produce closely matched data after decompression, while lossless will produce accurate original data.
.jpeg The higher the compression ratio, the worse the quality.Chien493
ParticipantVPN enables you to mask your location, IP address, and online activity.
Many employees do not have to go to the office to just “move” to their home workspace, and then connect to a VPN to access company resources and applications.Chien493
ParticipantSymmetric encryption uses the same key to encrypt and decrypt, asymmetric encryption uses one key to encrypt, and then uses another key to decrypt it
Chien493
ParticipantAs long as your personal information is leaked, it may be stolen. Use a more complicated account password
- AuthorPosts