Write a program that lets the user enter the initial height from which the ball is dropped, the bounciness index, and the number of times the ball is allowed to continue bouncing. Output should be the total distance traveled by the ball.

Answers

Answer 1

The following is the program for total distance traveled by the ball;

What do programming skills entail?

Programming, or "coding," skills are the ability to write commands in a variety of programming languages to tell a computer, application, or software program what to do and how to do it.

Write program for the distance travelled by ball.

height = float(input('Enter the height from which the ball is dropped: '))

bounci_index = float(input('Enter the bounciness index of the ball: '))

bounces = int(input('Enter the number of times the ball is allowed to

continue bouncing: '))

distance = height

for i in range(bounces-1):

height *= bounci_index

distance += 2*height

distance += height*bounci_index

print('\nTotal distance traveled is: ' + str(distance) + ' units.')

To know more about program visit

brainly.com/question/14368396

#SPJ4


Related Questions

Select the type of form control that "disguises" the characters that are typed.
a. text box
b. password box
c. encrypt box
d. hidden box

Answers

the style of frame element that hides the characters you type.the password box

What are form controls also known as?

The line of interaction between the client and the server is an interface control called a form control.By control type, interactions change:buttons: button menus: choose, file handling: input type="file," etc.and are additionally categorized.

Basic form control is what?

The majority of form widget kinds, such as single sentence text fields, time & date controls, control mechanisms without input like checkboxes, buttons, and colour pickers, buttons, and so forth, are created using this tool.

To know more about password box visit:

https://brainly.com/question/13987996

#SPJ4

pls help me
it's a chatbot assignment and i have been stick on it for 5 hours Png is bellow

Answers

To prevent any chatbot failure, avoid using single programming, and Create chatbot messages that adhere to the same protocol as live ch-at conversations.

What is a chatbot?

A chatbot, also known as a chatterbot, is a software application that uses text or text-to-speech to conduct online conversations instead of providing direct contact with a live human agent.

A chatbot is a computer program or software that simulates human conversation or "noise" via text or voice interactions.

Therefore, Users are likely to become bored if they fail to inject any personality into the bot or program it to handle unpredictable commands.

To learn more about chatbots, visit here:

https://brainly.com/question/18804668

#SPJ1

To move a PivotChart to a new sheet, use the _____ ______ button in the Actions group on the Pivot Chart Tools Analyze tab

Answers

Use the Field List to reorder the fields in your PivotTable (pivot table), and when it vanishes, reveal the Field List once more.

What does Excel's move Chart command do?

Click Move Chart under Chart Tools on the Design tab's Location group. Choose one of these: Click New sheet, then type a name for the worksheet in the New sheet box to move the chart to a new worksheet.

PivotTable toolbar button: what does it do?

You may filter and organize data using the icon buttons on the PivotTable toolbar. reveals the PivotTable Settings dialog box, which offers options for the layout, format, totals, filers, display, and data. each field's data on a sheet is sorted.

To know more about PivotChart visit:-

brainly.com/question/29833710

#SPJ4

class HashTable(): def __init__(self,nbuckets): pass def __len__(self): pass def __setitem__(self, key, value): pass

Answers

To determine the length of the instance attributes, utilize the magic method __len__. Now, the len(s) method internally calls the special method __len__() to return an object's length.

What does Excel properly?

Capitalizes the initial letter of a text string and any additional letters that come after any character other than a letter in the text. lowercase letters are used for all other letters.

Is the constructor _ init ?

Python classes have a reserved method called "__init__". In OOP principles, it is referred to as a constructor. When an object derived from the class is created, this method is called, enabling the class to initialize the attributes of the class.

To know more about Python visit:-

https://brainly.com/question/18502436

#SPJ4

When looking over a written document, you should reread for meaning, add, rearrange, remove and replace. What process are you using

Answers

The revision process includes three rounds of editing: the structure edit, the copy edit, and proofreading. The structural edit is performed at the paragraph level and concentrates on the logic and thought flow.

Is editing or revision done first?

It's time to move on to editing your work when you've done rewriting it. Editing involves changing the way sentences are put together and how they are phrased, but rewriting entails making significant, comprehensive changes to your paper's overall structure and arrangement.

What happens during a document revision?

In order to ensure that the document fulfills its objective, revision entails examining the global level and paragraph level organization of the draft and making modifications at the global, paragraph, and sentence levels.

To know more about editing visit:-

https://brainly.com/question/21263685

#SPJ4

One method users can employ to determine what the Game Camera object 'sees' is by looking for the yellow box it draws around a scene view.

True

False

Answers

Given the fact that one method users can employ to determine what the Game Camera object 'sees' is by looking for the yellow box it draws around a scene view, this is True.

The yellow box that is drawn around a scene view is a representation of the area that the Game Camera object "sees" in the game.

How does this work?

In Unity, the yellow box that is drawn around a scene view when the Game Camera object is selected is called the Camera Gizmo. It is a visual representation of the camera's view frustum, which is the 3D space that the camera can "see" in the game.

The view frustum is defined by the camera's field of view, aspect ratio, and near and far clipping planes. Objects that are within the camera's view frustum will be visible in the game, while objects outside of the view frustum will not be rendered.

By adjusting the camera's settings, such as its field of view or position, you can control what the camera "sees" in the scene and how the scene is rendered in the game.

Thus, the given statement is true.

Read more about program methods here:

https://brainly.com/question/23275071

#SPJ1

Which groups on her desktop system could you make her user account a member of to enable this configuration

Answers

Remote Desktop Users groups on her desktop system could you make her user account a member of to enable this configuration.

What exactly is the Remote Desktop Users Group?

The administrators' group's members are the only ones who can access remote desktops on Liquid Web's Windows servers by default. The Remote Desktop Users group, on the other hand, allows its members to safely connect to the server via RDP (Remote Desktop Protocol).

Is RDP preferable to VPN?

The primary distinction between VPNs and RDP is that an RDP gives your device more capabilities, whilst a VPN doesn't. Even though you're still using the same old device, it now has a new IP address and is far more safe when accessing the Internet.

To know more about Remote Dekstop User visit

brainly.com/question/26605428

#SPJ4

effective when sending a single message to several recipients and when needing to communicate 24 hours a day, 365 days a year.

Answers

Email, is effective when sending a single message to several recipients and when needing tocommunicate 24 hours a day, 365 days a year. Correct answer: letter C.

This means that recipients can receive emails at any time, which is especially beneficial for people in different time zones.

Email is a great tool for mass communication. It allows for a message to be sent to a large number of people with minimal effort.

Email is also easy to use, and most people are familiar with the basics of creating and sending emails. Additionally, messages that are sent via email can be easily tracked, giving the sender the ability to know when a message is received, opened, and responded to.

_____ is effective when sending a single message to several recipients and when needing tocommunicate 24 hours a day, 365 days a year?

A) A weblog

B) A wiki

C) Email

D) Malware

Learn more about The Email:

https://brainly.com/question/24688558

#SPJ4

A painting company has determined that for every 112 square feet of wall space, one gallon of paint and eight hours of labor will be required. The company charges $35.00 per hour for labor.
Write a function named compute_cost(), that takes area of wall space and the price of a paint gallon. Function then computes the following:
The number of gallons of paint required
The hours of labor required
The cost of the paint
The labor charges
The total cost of the paint job
Finally it returns the total cost to the calling program
Write the main() function that prompts the user to enter area of wall space to be painted and the price of a paint gallon. The main function then calls compute_cost() function to compute the cost and prints the total cos.
Make sure it is in python program

Answers

The sum of paint cost() and labor charge ()

print(f"The number of hours of lab time are needed: labour()hours" print(f"The number of gallons of paint are needed: gallons(wall)")

Print "The Price of Paint: $paint cost()," "The Price of Labor: $labour charge()," and "The Total Price of the Job: $round(total(), 2)"

In Python, what is a programme?

A collection of Python statements that have been carefully chosen to accomplish a certain task is the simplest definition of a programme.

The square footage of a wall in feet and the cost of a gallon of paint are inputted by the user into the python software. To determine the entire cost of the project based on the quantity of paint and the labour costs, five functions are used: gallons(), labour(), paint cost(), labour charge(), and total().

To know more about Python visit:-

brainly.com/question/18502436

#SPJ4

C. Theme: Object-oriented. Baic of programming ( encapulation, inheritance, polymorphim, clae, and object ). Structure and aociation. Tak : Create Book and Notebook clae and create the function that connect them

Answers

The four main principles of object-oriented programming are polymorphism, inheritance, encapsulation, and abstraction.

What is meant by object-oriented programming ?

Programming in the object-oriented (OOP) manner identifies classes of objects that are closely related to the methods (functions) with which they are associated. It also covers the concepts of attribute and method inheritance.

A system that is object-oriented enables users to totally concentrate on tasks rather than tools. C++ and Smalltalk are two examples of object-oriented programming languages.

OOP can be used to reduce the amount of work required in manufacturing and design applications. It can be applied, for instance, when creating flowcharts and blueprints. The designers and engineers can accurately create these flowcharts and blueprints thanks to OOP.

To learn more about OOP refer to :

https://brainly.com/question/14078098

#SPJ4

Write a java program to help the company cover a room with the fewest pieces of carpet needed. The carpet squares all measure an integer number of feet on each edge, and only accepts jobs for rooms with both width (W) and length (L) in integer number of feet. Obviously if a room is perfectly square, the company can finish the job with a single piece of carpet, and the maximum number of carpet squares that would ever be needed is L x W squares, each 1-foot on a side

Answers

Here is a sample Java program that calculates the minimum number of carpet squares needed to cover a room with a given width and length:

This program prompts the user to enter the width and length of the room in feet, and then calculates the minimum number of carpet squares needed to cover the floor. It does this by dividing the width and length of the room by the width and length of the carpet squares, and then rounding up to the nearest whole number. Finally, it prints the result to the console.

Note: In this program, the carpet squares are assumed to have a fixed width and length, which are represented by the variables carpetWidth and carpetLength. You will need to set these values to the appropriate dimensions for your carpet squares.

You are seeing streaks of toner across your papers when you are printing things using your office's laser printer. What is the MOST likely cause of this problem

Answers

It's usually a sign of a filthy transfer roller if you notice toner streaks on your printouts. As a result, routinely cleaning the transfer roller will keep your printed documents spotless.

What brings about toner streaks?

Toner can pour out of a broken cartridge, or it can cause streaky prints. It is necessary to change your toner cartridge if any of its photoconductor's (the part with the green or blue roller) parts are visibly harmed.

Why are there streaks on my laser printer's prints?

The most common causes of streaking are a used-up toner cartridge or a worn-out drum unit. Drum units are consumables that only require replacement after using three or four toner cartridges. Toner and drum units are not always used separately by printers.

To know more about laser printer visit:-

https://brainly.com/question/14783882

#SPJ4

Which of the following statements describe the benefits of a career in transportation, distribution, and logistics (TDL)? everfi

Answers

The statement that describes the benefits of a career in transportation, distribution, and logistics (TDL) is: It seeks to reduce logistics costs for the company and increase satisfaction for buyers.

What is a career in transportation, distribution, and logistics (TDL)?The planning, management, and transportation of people, materials, and commodities via road, pipeline, air, train, and water are the main areas of employment for the Transportation, Distribution, and Logistics Career Cluster.An expanding sector known as transportation, distribution, and logistics (TDL) links producers and other businesses with customers. To move items from one site to another securely and on schedule, a large TDL workforce is required due to the sharp development in eCommerce.In order to make sure that the product reaches the customer at the appropriate location and time while taking distribution and logistics into account, that profession assesses what is pertinent to logistics transport.

Learn more about TDL refer to :

https://brainly.com/question/29275775

#SPJ4

Murray is a database technician. He has created a single enterprise database system. How is this better than multiple databases in independent solutions

Answers

The process of centralizing many databases and instances to share resources and, among other things, save license and hardware costs, is known as database consolidation.

What does a database serve?

Any collection of data or information that has been properly structured for quick search and retrieval by a computer is referred to as a database, often known as an electronic database. Databases are designed to make it easy to save, retrieve, edit, and delete data while carrying out various data-processing tasks.

What advantages does a database offer a company?

A DBMS gives businesses a thorough understanding of how data is shared, preventing the needless duplication of data. A DBMS also enables businesses to enforce data security and privacy guidelines to lower the chance of a data leak.

To know more about databases visit:-

https://brainly.com/question/6447559

#SPJ4

Question:

Murray is a database technician. He has created a single enterprise database system. How is this better than multiple databases in independent solutions?

A. It results in data duplication

B. It results in data redundancy.

C. It results in data consistency.

D. It results in data concurrency.

List all of the permutations of {a, b, c} no replacement and length 3
Proof

Answers

If subsets, then the answer is correct.Notice that Part 4 * Part 5 = Part 1 6 * 10 = 60

What is permutation example?

An arrangement of things in a precise order is called to as a permutation. Here, the members of sets are arranged in a linear or relation to a matter. For illustrate, the set A=1,6 has a permutation of 2, which is 1,6,1. There is no other method for organizing the pieces of set A, as you can see.

1. That would be 5*4*3 = 60

Part 2 is the same as part 3,

just replace every "e" with a "c".

Part 3: correct

For enumerations, it's a good idea to be systematic in doing them,

so you don't miss any.

Alphabetical order would be good

a _ _, d _ _, e _ _

a(de, ed), d (ae, ea), e (ad, da)

ade, aed, dae, dea, ead, eda

Part 4: count the number of permutations in

part 2 or part 3: ? six.

Part 5: "subjects" ? or "subsets"

If subsets, then the answer is correct.

Notice that Part 4 * Part 5 = Part 1

6 * 10 = 60

To know more about permutations visit:

brainly.com/question/1216161

#SPJ4

The complete question is -

List all the permutations of {a,b,c}. This is a permutation and repeats are not allowed Therefore, there are p(3,3)= 3!/0! = 6 permutations, which are a, b, c ; a, c, b ; b, a, c ; b, c, a ; c, a, b ; c, b, a.

You decide to work late on a Saturday night to replace wiring in your server room. Upon arriving, you realize that a break-in has occurred and server backup tapes appear to be missing. What should you do as law enforcement officials arrive

Answers

As soon as law enforcement personnel show up, you should inform authorities that there is surveillance video on the property.

When handling a situation involving a data breach or data loss Chain of custody is defined.

Definitions: A procedure that keeps track of the transfer of evidence throughout its lifespan of collection, storage, and analysis by recording each individual who handled the evidence, the day and time it was gathered or moved, and the reason for the transfer

Which Soar component automates the reaction to security incidents involving IT?

What SOAR component is used to automate the response to security incidents involving IT? D. Security orchestration, automation, and response (SOAR) is a software program created to improve the effectiveness of incident response by speeding up reaction times.

To know more about law enforcement personnel  visit :-

https://brainly.com/question/12570740

#SPJ4

A computer program outputs whether a capital city in Europe is north or south of another capital city in Europe. It only needs to know the latitude of the two cities – the other detail is unnecessary. This is an example of abstraction; including the necessary detail and not including the unnecessary detail.

Answers

Answer:

Yes, that is correct.

Explanation:

Abstraction is the process of focusing on the essential features of something and ignoring non-essential details. In this case, the program is only concerned with the latitude of the two cities, so it ignores all other details about the cities and only outputs whether one city is north or south of the other. This helps to simplify the program and make it more efficient by only dealing with the necessary information.

Do while statement flowchart

Answers

The flowchart of a "do-while" loop can be described as follows:

The program starts at the Start block.The loop counter is initialized at the Initialize loop counter block.The program enters the Do block, where the loop body is executed.The program then evaluates the condition at the Condition block.If the condition is true, the program proceeds to the End block, and the loop is finished.If the condition is false, the program moves to the Increment loop counter block, where the loop counter is incremented.The program then returns to the Do block, and the next iteration of the loop begins.This process continues until the condition in the Condition block is met, at which point the program proceeds to the End block, and the loop is finished.

The key characteristic of the do-while loop is that the loop body is executed at least once before the condition is checked and that the condition check happens at the end of each iteration, allowing the loop body to execute at least one time.

Read more about Do-While loop here:

https://brainly.com/question/19706610

https://brainly.com/question/23419814

The correct question is: "Write the flowchart for Do-while statement"

Is each of the following an absolute pathname, a relative pathname, or a simple filename? a. milk_co b. correspond/business/milk_co c. /home/max d. /home/max/literature/promo e. ..
f. letter.0210

Answers

easy pathname milk co correspond/business/milk co; relative pathname c. The absolute pathname is /home/max. /home/max/literature/promo d A basic filename with an absolute pathname is etter.0210.

Describe an example of an absolute path.

/home/sally/statusReport is an absolute path; it always includes the root element and the entire directory list needed to find the file. The path string contains each and every piece of data required to find the file.

What distinguishes a pathname that is absolute from one that is relative?

If a file or directory is to be located entirely outside of the root directory (/), it must be specified using an absolute path. In other words, a complete path starting at the root of the actual file system, or the / directory, is what we mean by an absolute path. The definition of a relative path is a direct, connected connection to the present (pwd).

To know more about relative pathname visit :-

https://brainly.com/question/17084451

#SPJ4

the field or fields on which records are sorted is called the sort key. true or false

Answers

True. The report's sort key refers to the field or fields on which records are sorted.

An important sort key is what?

The first sort field, rep number, is referred to as the main sort key (also known as the primary sort key), and the second sort field, customer name, is referred to as the minor sort key when records are sorted by more than one field, such as sorting by rep number and then by customer name (also called the secondary sort key).

In Access, how do you sort numbers?

The Sort & Filter group can be found by clicking the Home tab on the Ribbon. The field can be sorted by choosing the Ascending or Descending command.

To know more about sort key visit :-

https://brainly.com/question/13130958

#SPJ4

Which of the following devices is used for connecting multiple network hosts where the physical signal is always repeated to all ports?
A. Bridge
B. Router
C. Hub
D. Switch

Answers

The physical signal is always repeated to all ports on hub devices, which are used to connect numerous network hosts.

Which of the following gadgets doesn't pass broadcast data?

Any broadcast packets that are received by a hub, switch, or all other segments in the broadcast domain will be forwarded by those devices, but not by a router.

What network device can be used to link several devices and does not block broadcast traffic?

A hub is a basic type of Layer 1 Ethernet repeater that enables the connection of numerous devices to the same Ethernet network. All ports on a network hub get the same traffic since, unlike a switch, a hub DOES NOT split up collision domains.

To know more about hub visit :-

https://brainly.com/question/14332796

#SPJ4

Which BEST describes a third-generation computer? A. the CPU was used for the first time, computers could be owned by the general public, and a GUI was used B. used operating systems, keyboards, and monitors for the first time, and integrated circuits were used to supply electricity C. used artificial intelligence so that the computers become reasonably intelligent all on their own D. high-level programming languages, magnetic tape and disks for storage, and used small transistors to supply electricity

Answers

THIRD - GENERATION COMPUTER

C. used artificial intelligence so that the computers become reasonably intelligent all on their own

Third-generation computers were developed in the 1960s and marked a significant advancement in the development of computers. They were the first computers to use integrated circuits, which allowed for smaller and more powerful computers. Third-generation computers also featured the development of high-level programming languages, such as COBOL and FORTRAN, which made it easier for programmers to write and understand code. These computers also used magnetic tape and disks for storage, which were much more efficient than the punched cards used in earlier computers. Third-generation computers made use of artificial intelligence, which allowed them to perform tasks that required some level of independent thought and decision-making.

Hope This Helps You!

You need a fast, secure, and reliable multihomed network perimeter solution that is designed to prevent specific types of network traffic from entering your corporate network. Which solution should you deploy

Answers

Using a ( VPN) virtual private network is the best approach to grant users access to private resources via the internet since encryption of all data assures a secure connection between the client and server.

What network security protocol enables the use of a single setup to encrypt all network traffic?

Contrary to application security protocols like HTTPS, which are only applicable to web servers and require a PKI certificate for each server, IPSec can be configured to secure some or all network traffic with a single setup.

Which of the following has the greatest chance of preventing buffer overflow attacks?

By making sure you are up to current with system and application fixes, buffer overflow threats can frequently be reduced.

To know more about VPN visit:-

https://brainly.com/question/29733551

#SPJ4

Users report they have to select the output tray at the printer, even though the correct tray is selected in the print dialog. Which of the following should a technician perform FIRST to attempt to solve the problem

Answers

On the print server, reinstall the driver. Even when the right tray is selected in the print dialog, users claim they still need to choose the output tray at the printer.

Does a wireless printer make sense?

A wireless printer that relies on a hands-free gadget makes it simpler to operate when you're on the go. You will undoubtedly save a lot of money because there is no installation required. They operate within any household or business's budget.

What is a wireless printer's drawback?

The wireless printer's drawback is that an access point or wireless router is required. You are unable to use the wireless printer without a wireless network. However, the majority of houses and businesses already have wireless networks.

To know more about printer visit:

https://brainly.com/question/17136779

#SPJ4

the security team was eventually able to write a better rule to match the sql injection technique that the attacker had used.

Answers

Input validation and parametrized queries with prepared statements are the only effective defences against SQL Injection attacks. Not just web form inputs like login forms must be sanitised by the developer.

What is SQL Injection attacks ?In computer science, SQL injection is a method of attacking data-driven systems by injecting malicious SQL statements into entry fields for execution. Although SQL injection is primarily recognised as a website attack vector, it may be used to target any kind of SQL database.Attackers can become administrators of the database server, spoof identities, alter already-existing data, cause repudiation problems like cancelling transactions or changing balances, allow full disclosure of all data on the system, destroy data or otherwise make it unavailable, and cause repudiation issues.In fields like login boxes, search boxes, or "sign up" fields, hackers input SQL commands. The goal is to access a system using intricate code sequences and divulge the data stored inside.

To learn more about SQL Injection refer :

https://brainly.com/question/15685996

#SPJ4

The "Traveling Salesperson Problem" poses this question: A salesperson is given a list of cities and the distances between them. The salesperson has to visit each city exactly once and then return to the first city. What is the shortest possible route the salesperson could take? Assume an actual salesperson is trying to determine the shortest route she can take to visit 18 cities. She could use a computer program to calculate the distance of every possible route and then select the shortest one. Alternatively, she could use a heuristic to find a route. Which of the following reasons would justify the use of a heuristic? Elimination Tool​

Answers

When using an algorithm to solve a problem is difficult or impractical, a heuristic is employed. We therefore need something that works well enough to find a route. A heuristic excels in this situation.

A heuristic function's definition.

A heuristic function is a function that estimates a problem's approximate cost (or ranks alternatives). Finding the shortest driving distance to a destination is an example of a problem. The distance in a straight line to the spot would be a heuristic cost. Informed Search employs the heuristic function, which identifies the most promising route. It generates an estimate of how far away the agent is from the goal using the agent's current condition as input.

What sort of heuristic algorithm is that?

By providing quick answers, heuristic algorithms are utilized to solve NP-hard problems and reduce the time complexity of issues. It is frequently used to solve artificial intelligence issues. One illustration is informed search, when more data is available to determine the following step in locating the answer.

To learn more about heuristic algorithm visit:

brainly.com/question/3064392

#SPJ1

4.5 code practice phython code answers

Answers

Answer:

count = 0

data = input('Please enter the next word: ')

while data!= "DONE":

         count = count + 1

         print("#" + str(count) +": You entered the word " + data)

         data = input("Please enter the next word: ")

print("A total of "+ str(count) + " words were entered.")

Explanation:

So the code is asking us to put in words from the user and then it will count those words in total.

so first we want the code to start from 0 to get an accurate count

count = 0

boom, first line.

second you will ask the user to input a word with a data string on it to then have it stored

data = input('Please enter the next word: ')

now if the user enters DONE the code will know to stop and give the total

while data != "DONE":

then we will have the code count the words we inputed,

count = count + 1

next we want to know how many words we put in "the whole point of the code.

print("#" + str(count) +": You entered the word " + data)

the data is very important

if the user didnt enter DONE we want the code to continue so we ask the user to enter another word    

  data = input("Please enter the next word: ")

now we do the same thing as the code before, now we show how many words were entered in total

print("A total of "+ str(count) + " words were entered.")

Stay blessed

Stay up

An isolated equipment grounding receptacle is installed using a rigid nonmetallic conduit and a metal device box. Two 12 AWG conductors enter the box and are spliced to two 12 AWG conductors leaving the box and to two pigtails, which feed the receptacle. The 12 AWG isolated equipment ground has a pigtail splice for the receptacle and continues through the box. A bare 12 AWG equipment grounding conductor enters the box, connects to the box grounding screw, and continues on through the box. Determine the minimum size metal device box for this installation.

Answers

The minimum size metal device box for this installation 3 x 2 x 3 1/2 device box.

What amount of cubic inches of room is needed to instal one no. 12 AWG conductor in a box or conduit fitting?A 2.25 cubic inch, each conductor with a gauge of 12 AWG needs 2.25 cubic inches of space. Both the two white and the two black 12 AWG wires must be counted. The two green equipment-grounding conductors are treated as a single 12 AWG conductor in accordance with 314.16(B)(5).Both the equipment grounding conductor and the grounded circuit conductor must be extended to the second building.Box-fill estimates do not take into account minor fittings like bushings, wire connections, and locknuts. A single count is required for each conductor with an outside-the-box origin that is terminated or spliced inside the box.

To learn more about 12 AWG conductor refer to:

https://brainly.com/question/6531988

#SPJ4

You are working on a project that requires virtualizing an operating system (OS) for an end user to test an application. It has been requested that you use a type-2 hypervisor to accomplish this. Which of the below would fulfill that requirement

Answers

You are need to carry out this task using a type-2 hypervisor. You are engaged in a project that calls for virtualizing the kvm operating system.

What hardware is KVM?

A KVM switch is a piece of hardware that enables a user to operate several computers from one or more sets of keyboards, video displays, and mice. KVM is an acronym for "keyboard, video, and mouse."

Why is a KVM required?

In conclusion, a KVM is a device that enables rapid and simple switching between many PCs or servers from a single console (keyboard, monitor, and mouse configuration) for improved administration, cost- and space-saving, and increased efficiency. A KVM switch is frequently helpful in the following situations: Home Office. Small

To know more about KVM visit:

https://brainly.com/question/13439312

#SPJ4

You are a server virtualization consultant. During a planning meeting with a client, the issue of virtual machine point-in-time snapshots comes up. You recommend careful use of snapshots because of the security ramifications. Which security problem is the most likely to occur when using snapshots

Answers

When employing snapshots, the security issue that is most likely to arise will have less patch updates than invoked snapshots.

What kind of hypervisor would be necessary to use an existing server running an existing operating system?

Typically, a Type 2 hypervisor is set up on top of an existing OS. It is frequently referred to as a hosted hypervisor since it uses the pre-existing OS of the host system to control calls to CPU, memory, storage, and network resources.

What does server virtualization primarily provide users of cloud computing?

What are the advantages of server virtualization? It makes cloud computing more practical and effective. Any machine to which the user has access can access the virtual desktop.

To know more about invoked snapshots visit :-

https://brainly.com/question/5244511

#SPJ4

Other Questions
In fgh, g = 64 cm, f=131 and g=47. find the length of f, to the nearest centimeter. a poem about comparing yourself to a object, place, people, or a animal.example: you and a horse because you are fast. 3.3.5 Practice: Write an Informational Essay I NEED ALL ANSWERS PLSSS How many lives were lost in internment camps? If Brian could have bought exactly 12 pairs with the amount of money that was spent on apples and oranges find the cost of each pair incense in terms of x Given that c:d is 4:3 and d:u is 2:9, find c:d:u. What does the daffodils represent in the poem? 8. Sarah has a cube with a volume of 2,197 cubic centimeof Sarah's cube?volume of 2,197 cubic centimeters, which square represents the faces15 cm25 cm13 cm10 cm DIRECTIONS Write a word or phrase that has the same meaning as the term given. 1. Lower Egypt 2. dynasty 3. afterlife 4. pharaoh S. delta 6. Nile River 7. pyramidFrom HMH Guided Reading workbook If you need to stop quickly and your vehicle is not equipped with an Anti-Lock Braking System (ABS), you should: help me pleaseeeeeeeee!! If a solution is 8% solute, it is [x]% solvent Who held the power of government under the Articles of Confederation? Television spots are tied to ratings performance. A station does not generate an audience of the size promised, the station must provide what is called a which method of alertig fire department members of an emergency alerts the member by tone, light and or vibration Find three consecutive integers such that 4 times the first decreased by the second is 12 more than twice the third Select all the inequalities that have the same graph as x Which of the following will happen if the actual inflation rate is greater than the expected inflation rate Whats these countrys for Africa Describe one way a president can increase the chances of having judicial nominations to federal courts confirmed.