Answer:
1 web
2- invintory
3- spreadsheet
4-survey
Explanation:
hope it helps
Answer:
1. WE.b Ch.at
2. spreadsheet
3. Online Inventory
4. online survey
Explanation:
Hope this helps ^^
Have a great day!
1)write a python program to check wheter the given number is even or odd
2) write a python program to add any 5 subjects makrs, find sum and average (average=sum/5)
3)write a python program to print numbers from 1 to 100 using loops
Answer:
n = 16
if n%2:
print('{} is odd'.format(n))
else:
print('{} is even'.format(n))
m1 = 5
m2 = 4
m3 = 6
m4 = 8
m5 = 9
sum = m1+m2+m3+m4+m5
average = sum/5
print("The sum is {}, the average is {}". format(sum, average))
for i in range(1, 101): print(i, end=",")
Explanation:
Above program does all three tasks.
Answer:
1) num1 = int(input("Enter the number to be checked: "))
if num1%2==0:
print("Your number is an even number!")
else:
print("Your number is not even!")
2) maths = int(input("Enter your maths mark: "))
english = int(input("Enter your english mark: "))
social = int(input("Enter your social mark: "))
science = int(input("Enter your science mark: "))
computer = int(input("Enter your computer mark: "))
Sum = maths + english + social + science + computer
average = Sum / 5
print("Sum of your marks are:",Sum)
print("average of your marks are:",average)
3) num = 0
while num <= 99:
num+=1
print(num)
Explanation:
Welcome.
WILL GIVE BRAINLIEST IF DONE CORRECT
Write a program in PYTHON that will simulate an ATM machine. A user at this ATM machine can do one of 5 things:
1 – Deposit (adding money to the account)
2 – Withdrawal (removing money from the account)
3 – Balance Inquiry (check current balance)
4 – Transfer Balance (transfer balance from one account to another)
5 – Log Out (exits/ends the program)
Before a user can do any of those things, he/she must first enter his/her username and passcode. After 3 incorrect attempts at entering the username and password, the program will end. The list of legitimate users along with their user ID, passcode, and account balance is shown below.
Customer, Username, Password, Savings Account, Checking Account
Robert Brown, rbrown, blue123, $2500.00, $35.00
Lisa White, lwhite, red456, $500.00, $1250.00
Mark Black, mblack, green789, $750.00, $200.00
Once the user enters the username, password, and option choice correctly, process the transaction according to these rules:
Allow the user to make up to a maximum of 3 transactions at a time. After 3 transactions, the program will terminate and they must log in again.
After a transaction is completed, the program will update the running balance and give the customer a detailed description of the transaction. A customer cannot overdraft on their account; if they try to withdraw more money than there is, a warning will be given to the customer.
Also, note that the ATM doesn’t distribute or collect coins – all monetary values are in whole dollars (e.g. an integer is an acceptable variable type). Any incorrect transaction types will display an appropriate message and count as a transaction.
Answer:
import sys
#account balance
account_balance = float(500.25)
##prints current account balance
def printbalance():
print('Your current balance: %2g'% account_balance)
#for deposits
def deposit():
#user inputs amount to deposit
deposit_amount = float(input())
#sum of current balance plus deposit
balance = account_balance + deposit_amount
# prints customer deposit amount and balance afterwards
print('Deposit was $%.2f, current balance is $%2g' %(deposit_amount,
balance))
#for withdrawals
def withdraw():
#user inputs amount to withdraw
withdraw_amount = float(input())
#message to display if user attempts to withdraw more than they have
if(withdraw_amount > account_balance):
print('$%.2f is greater than your account balance of $%.2f\n' %
(withdraw_amount, account_balance))
else:
#current balance minus withdrawal amount
balance = account_balance - withdraw_amount
# prints customer withdrawal amount and balance afterwards
print('Withdrawal amount was $%.2f, current balance is $%.2f' %
(withdraw_amount, balance))
#system prompt asking the user what they would like to do
userchoice = input ('What would you like to do? D for Deposit, W for
Withdraw, B for Balance\n')
if (userchoice == 'D'): #deposit
print('How much would you like to deposit today?')
deposit()
elif userchoice == 'W': #withdraw
print ('How much would you like to withdraw today?')
elif userchoice == 'B': #balance
printbalance()
else:
print('Thank you for banking with us.')
sys.exit()
Answer:
account_balance = float(500.25) print('Your current balance: %2g'% account_balance) ('Deposit was $%.2f, current balance is $%2g' %(deposit_amount, balance)) print('$%.2f is greater than your account balance of $%.2f\n' % (withdraw_amount, account_balance))('Withdrawal amount was $%.2f, current balance is $%.2f' % (withdraw_amount, balance)) ('How much would you like to deposit today?') ('How much would you like to withdraw today?') ('Thank you for banking with us.')
Explanation:
The simple answer
"kannst du mir bitte helfen" in German-English from Reverso Context: Hier, kannst du mir bitte helfen?
Answer:
"Come help me, please" "Can you help me here?"
Explanation:
Some form of question or help, i think...
Internal combustion engines use hot expanding gasses to produce the engine's power. Technician A says that some engines use spark to ignite the gasses. Technician B says some engines use compression to ignite the gasses. Who is correct?
Answer:
Explanation:
Both are right.
Engines are divided into:
1) Internal combustion engines
2) Diesels
A person is sledding down a hill at a speed of 9 m/s. The hill gets steeper and his speed increases to 18 m/s in 3 sec. What was his acceleration?
Answer:
3 m/s^2
Explanation:
You are given their initial velocity and their final velocity, as well as the time.
This allows you to use the equation for acceleration, a = Δv/Δt (change in velocity over change in time):
vfinal - vinitial = Δv
(18 m/s - 9 m/s)/ 3 sec = 3 m/s^2
PAN‐OS® software supports which two authentication types? (Choose two.)
A. RADIUS
B. SMB
C. TACACS+
D. AWS
The two authentication types supported by PAN-OS® software are RADIUS and TACACS+. AWS and SMB are not authentication types.
RADIUS (Remote Authentication Dial-In User Service) and TACACS+ (Terminal Access Controller Access-Control System Plus) are both protocols used for network authentication. RADIUS is a widely used protocol for authentication, authorization, and accounting (AAA) services, while TACACS+ provides more features for authorization and accounting compared to RADIUS. Both protocols allow for centralized authentication, which improves security by reducing the number of credentials users need to remember and manage. PAN-OS® software supports both protocols, making it a versatile and secure choice for network authentication.
learn more about software here:
https://brainly.com/question/985406
#SPJ11
which method can be used to verify that a bit-level image copy of a hard drive
One method that can be used to verify the accuracy of a bit-level image copy of a hard drive is to perform a hash value check.
This involves generating a unique code for both the original hard drive and the copy, known as a hash value. By comparing the hash values of the two drives, it is possible to determine whether the copy is an accurate representation of the original.
This method is commonly used in digital forensics and is highly reliable, as even small changes to the data on the drive will result in a different hash value. Some popular hash algorithms used for this purpose include MD5, SHA-1, and SHA-256.
Learn more about hard disk at
https://brainly.com/question/31920628
#SPJ11
The ________ networks operate close to the legitimate free hotspots and typically provide stronger signals
Answer:
Rogue Hotspot
Explanation:
Why do digital media professionals create portfolios of their work?
Answer:
Then you're going to have to create a digital media portfolio in order to showcase your technical skills and knowledge. It can act as your online resume. You can use it to showcase your related work and projects to potential employers and clients online.
Explanation:
with the use of mobile ip, which device is responsible for keeping track of mobile nodes (mns) and forwarding packets to the mn's current network?
Home agent (HA) is the device responsible for keeping track of mobile nodes (mns) and forwarding packets to the mn's current network.
Mobile IP allows IP datagrams to be routed to mobile nodes. A mobile node's home address always identifies the mobile node regardless of its current point of attachment to the Internet or an organization's network. When away from home, the care-of address associates the mobile node with the home address by providing information about the mobile node's current point of attachment to the Internet.
The home agent reroutes the datagram from the home network to the care-of address by creating a new IP header containing the mobile node's care-of address as the destination IP address. This new header then encapsulates the original IP datagram and prevents the mobile node's home address from affecting routing until the encapsulated datagram reaches the care-of address.
This type of encapsulation is also called tunneling. Upon arrival at the care-of address, each datagram is decapsulated and delivered to the mobile node.
For further information regarding forwarding packets, click the link below:
brainly.com/question/30033813
#SPJ4
Prove that: P = hdg
Answer:
here u go your answer
Explanation:
.............
Fuses and lighting are items that the engineering
division would maintain and service as part of the operation’s
__________ system. *
a. electrical
b. plumbing
c. HVAC
d. refrigeration
Fuses and lighting are items that the engineering division would maintain and service as part of the operation’s a) electrical system.
An electrical system is the set of components and systems that provide electric power to a variety of machinery and equipment. Electrical systems are a critical aspect of any industrial process, whether it's a massive manufacturing plant or a simple machine that performs a specific function. Engineers and technicians who specialise in electrical systems work to ensure that the equipment operates safely and efficiently.
To conclude, Fuses and lighting are items that the engineering division would maintain and service as part of the operation’s electrical system.
Therefore, the correct answer is a. electrical
Learn more about electrical system here: https://brainly.com/question/31369711
#SPJ11
What are the
advantages and
main features of
Electronic Toll Collection (ETC) in Intelligent
Transportation Systems?
Electronic Toll Collection is a system that enables the collection of tolls without the use of manual toll collection methods, which require cars to stop. In contrast, ETC automates the toll collection process by detecting the toll payment by scanning a radio frequency identification (RFID) tag installed in the vehicle, making the entire process more efficient and smoother.
What are the advantages and main features of Electronic Toll Collection (ETC) in Intelligent Transportation Systems Advantages of Electronic Toll Collection (ETC)The advantages of ETC include time-saving, reduced congestion, and greater traffic management.
They are as follows: Time-saving: By eliminating the need for drivers to stop to pay tolls, ETC systems can help reduce travel time. It enables a smooth flow of traffic, which reduces the time it takes for drivers to reach their destination. ETC systems feature automatic toll collection, RFID tags, and benefits for commuters.
To know more about system visit:
https://brainly.com/question/19843453
#SPJ11
Write a program whose input is two integers and whose output is the two integers swapped.
To write a program whose input two intergers and generates a swapped integer output, we need:
In this program, two integer variables x and y are declared. Then, the user is requested to input two integer values. These values are stored in variables x and y using the scanf() function. Then, the original values of x and y are printed using printf(). After that, the values of x and y are swapped using a third temporary variable temp. Finally, the swapped values of x and y are printed using printf().The Code:#include <stdio.h>
int main(void)
{
int x, y;
printf("Enter two integer values: ");
scanf("%d%d", &x, &y);
printf("Original values: x = %d, y = %d\n", x, y);
int temp = x; // swap values of x and y
x = y;
y = temp;
printf("Swapped values: x = %d, y = %d\n", x, y);
return 0;
}
Learn more about programming:
https://brainly.com/question/23275071
#SPJ4
Create a flowchart that will accept 10 whole numbers one at a time and print the highest and the lowest. Use Switch.
I will create a sequence of steps that would accept 10 whole numbers one at a time and print the highest and the lowest in Java:
Import javax.swing.JOptionPane;
public class loop_exer2 {
public static void main(String agrs[])
{ String input; int trial=10, sc=0, h=0, l=0, test=0;
System.out.print("Scores: ");
for (int ctr=1;ctr<=10;ctr ) {
input=JOptionPane.showInputDialog("Enter the Scores [" trial "] trials "); sc=Integer.valueOf(input); System.out.print(sc ", ");
if(test==0){h=sc;l=sc;test=1;}
if(sc>h){h=sc;}
else if(sc>h){
h=sc; {
else if(sc<1) {
l=sc;
}
JOptionPane.showMessageDialog (null, "Highest score is:" h "Lowest score is:" l);
System.out.println();
System.out.println ("Highest score is: " h);
System.out.println ( "Lowest score is: "l);
}
}
What is a Flowchart?This refers to a diagram which is used to represent the various steps which a system uses to create a step by step solution.
From the above code, there is the command to accept whole numbers in String and then request for them one at a time and after the computation, display the highest and lowest numbers.
Read more about flowcharts here:
https://brainly.com/question/6532130
Why might you want to collect multiple items in the Office Clipboard?
Answer:
So you have more items to work with.
Explanation:
give me rationale about brake system???
The brake system in a vehicle plays a critical role in ensuring safety, control, and efficient operation.
Here are some rationales for the importance of a well-designed and functioning brake system:
1)Safety: The primary purpose of the brake system is to provide reliable and efficient stopping power, allowing the driver to slow down or bring the vehicle to a complete stop when necessary.
A properly functioning brake system is crucial for avoiding accidents, preventing collisions, and protecting the driver, passengers, and others on the road.
2)Control and Handling: A well-designed brake system enhances the driver's control over the vehicle.
It enables smooth deceleration and allows for precise modulation of braking force, providing better handling and maneuverability.
This allows the driver to respond to changing road conditions, traffic situations, and emergencies effectively.
3)Energy Conversion: The brake system converts kinetic energy into thermal energy through friction, allowing the vehicle to reduce its speed or stop.
This energy conversion process is essential for managing the vehicle's speed and preventing excessive heat buildup in the braking components.
4)Performance and Responsiveness: An efficient brake system ensures prompt response and reliable performance, allowing the driver to trust the brakes when needed.
It should provide consistent braking force, even under different driving conditions such as wet or slippery surfaces.
A well-designed brake system improves the overall driving experience by instilling confidence and predictability in the braking process.
5)Maintenance and Longevity: Regular maintenance of the brake system, including inspections, pad and rotor replacements, and fluid flushes, is crucial for its longevity and optimal performance.
A properly maintained brake system minimizes the risk of component failure, extends the lifespan of brake components, and reduces the chances of costly repairs.
For more questions on brake system
https://brainly.com/question/30262553
#SPJ8
In the alphabets: ABCDEFGHIJKLMNOPQRSTUVWXYZ. If the PHP code is QLY. What is the SQL code?
The SQL code corresponding to the PHP code "QLY" is "EIU".
To find the SQL code based on the given PHP code, we can map each letter of the PHP code to its corresponding letter in the alphabet and derive the SQL code accordingly.
In the given PHP code "QLY", we can substitute each letter with its corresponding letter in the alphabet:
Q maps to E
L maps to I
Y maps to U
Know more about SQL code here:
https://brainly.com/question/31905652
#SPJ11
Carrie needs to keep a budget for her department. Each employee in her department sends her travel expenses. In cell, C2, C3, C4, and C5, she enters the total of each employee’s expenses. In cell B1, she enters the original amount of money the department was allotted for spending. What formula should she use to calculate the amount of money the department currently has?
=B1 -(C2+C3+C4+C5)
=B1-C2+ B1-C3+B1-C4+B1-C5
= (C2+C3+C4+C5)-B1
=(B1+C2+C3+C4+C5)
Answer:
(C2+C3+C4+C5)-B1
Explanation:
Answer:
=(C2+C3+C4+C5)/4
Explanation:
add all numbers together then div. by the total amount of numbers is how you get the average.
I really need this done Thank you!!
Answer:
10
Explanation:
the interval in the printed numbers is 10.
referential integrity constraints are generally established between:
Referential integrity constraints are generally established between tables in a database.
In a relational database, referential integrity is enforced through the use of foreign key constraints. A foreign key is a column or set of columns in one table that refers to the primary key of another table. The primary key uniquely identifies a record in a table, while the foreign key establishes a relationship between tables.
It states that referential integrity constraints are generally established between tables in a database to ensure the maintenance of relationships and prevent data inconsistencies.
A foreign key is a column or set of columns in one table that refers to the primary key of another table. This establishes a relationship between the tables. The primary key uniquely identifies a record in a table, and the foreign key links it to related records in another table. Referential integrity constraints ensure that any changes made to the primary key or related records are properly reflected and maintained across the tables, preventing data inconsistencies or anomalies.
Learn more about relational database here:
https://brainly.com/question/13262352
#SPJ11
Write a program to print sum on first 10 natural numbers.
#include
int main()
{
int i, sum;
for(i=1;i<=10;++i);
{
sum =sum + i;
}
printf("The sum is = %d",sum);
}
A program that prints the sum on the first 10 natural numbers is:
int sum=0;int i=1;for(i=1; i <= 10 ; i++) // the value of i will be from 1 to 10{sum=sum+i; //each number will get added to the variable ‘sum’}System.out.println(sum); //What is a program?A computer program in a programming language is a set of instructions and commands written in a language that a computer can execute or understand.
Using the For Loop program, the variables of the first 10 natural numbers can be written as:
int sum=0;int i=1;for(i=1; i <= 10 ; i++) // the value of i will be from 1 to 10{sum=sum+i; //each number will get added to the variable ‘sum’}System.out.println(sum); //Learn more about writing a program here:
https://brainly.com/question/23275071
What do you think are the importance of learning the components of motherboard?
Answer:
A motherboard, also known as the "main board," is the central circuit hub that allows connection between all components attached to the computer.
Explanation:
In the communication process model, 'decoding the message' occurs immediately: Group of answer choices before the sender forms the message. after the receiver receives the message. after the sender forms feedback of the original message. after the receiver transmits the message. before the receiver receives the message.
According to the communication process model, decoding is the interpretation of the symbols or signs that arrive in a message and it occurs after the receiver receives the message.
What is the communication process model?It is a model that is based on the communication process and the production of the meaning of a message, where two processes actively intervene, that of emission and reception, which are different.
The sender performs a coding operation to convey an idea, that is, the message is made up of a series of different types of organized signs.
On the other hand, this message is decoded by the receiver according to its own circumstances, that is, the receiver transforms the symbolic code sent by the sender into ideas.
Therefore, we can conclude that according to the communication process model, decoding is the interpretation of the symbols or signs that arrive in a message and it occurs after the receiver receives the message.
Learn more about communication process model here: https://brainly.com/question/1819139
if the operating system of a computer uses gui, then the programmer can incorporate gui elements into a program.
T/F
True. If an operating system uses a graphical user interface (GUI), programmers can incorporate GUI elements into their programs.
When an operating system employs a GUI, such as Windows, macOS, or Linux with a desktop environment like GNOME or KDE, it provides a visual interface for users to interact with their computers. GUI elements include windows, buttons, menus, text boxes, and other graphical components that facilitate user interaction. Programmers can utilize the functionality provided by the operating system to incorporate these GUI elements into their software applications.
By utilizing the application programming interfaces (APIs) and libraries provided by the operating system, programmers can create windows, dialogs, and other GUI elements, define their appearance and behavior, and handle user input. These elements allow users to interact with the program visually, making it more intuitive and user-friendly. The programmer can customize the GUI elements to match the look and feel of the operating system or create a unique visual design. The GUI elements provide a means for users to input data, trigger actions, and receive feedback, enhancing the overall user experience of the software application.
Therefore, when an operating system supports GUI, programmers can incorporate these elements to create visually appealing and interactive programs.
to learn more about operating system click here:
brainly.com/question/13383612
#SPJ11
What would be displayed if you pinged a website that is down? By putting cmd in the start button and click on command prompt.
The result after pinging a website that is down will contain the line "Request timed out".
To carry out this simple procedure,
1. press the start button. While holding it, use another finger to press "R".
This will call up a dialogue box called "Run".
2. The Run dialogue box will contain a space where you can type "CMD" and hit the enter key. This will call up the Command Prompt interface.
3. Soon as that interface is displayed, type "ping" leave a space. Then type the name of the website you want to ping.
4. Soon as that is done hit the enter button. If the website is live and healthy, it will return four lines each starting with "Reply from...."
5. If however, the resultant message contains "Request timed out", then the website is down.
Learn more about Pinging a Website here:
https://brainly.com/question/4261344
Jim is writing a program to calculate the wages of workers in a teddy bear factory.
The wages earned by a worker is either £2 for every teddy bear they have made or £5 for every hour they have worked, whichever is larger.
Write an algorithm that:
• allows the user to input the number of teddy bears made and the number of hours worked
• calculates the wages for the number of teddy bears made
• calculates the wages for the number of hours worked
• outputs the larger of the two results.
Answer:
The algorithm is as follows;
1. Start
2. Input TeddyBears
3. Input Hours
4. WagebyTeddy = 2 * TeddyBears
5. WagebyHour = 5 * Hours
6. If WagebyHour > WagebyTeddy then
6.1 Print WagebyHour
7. Else
7.1. Print WagebyTeddy
8. Stop
Explanation:
The following variables are used;
TeddyBears -> Number of teddy bears made
Hours -> Number of Hours worked
WagebyTeddy -> Wages for the number of teddy bears made
WagebyHour -> Wages for the number of hours worked
The algorithm starts by accepting input for the number of teddy bears and hours worked from the user on line 2 and line 3
The wages for the number of teddy bears made is calculated on line 4
The wages for the number of hours worked is calculated on line 5
Line 6 checks if wages for the number of hours is greated than wages for the number of bears made;
If yes, the calculated wages by hour is displayed
Otherwise
the calculated wages by teddy bears made is displayed
what should the server do if they have any doubts regarding whether a patron is obviously intoxicated?
The server ensures the patron leaves within a reasonable period of time if they have any doubts regarding whether a patron is obviously intoxicated.
What are the strategies used to prevent intoxication?The strategies that can be used in order to prevent intoxication are as follows:
Make water available and have staff offer it regularly to encourage patrons to pace their alcohol consumption. Encourage patrons to stop drinking or consume non-alcoholic drinks before they reach the point of undue intoxication. Lower the entertainment noise level to allow patrons to talk; this slows down drinking.Once a patron becomes intoxicated, they must leave the premises and not be allowed back in. While they may have accepted your offer of a non-alcoholic drink, they will still need to leave.
To learn more about Intoxication, refer to the link:
https://brainly.com/question/13614186
#SPJ1
What is Information Technology General Controls (ITGCs)?
Information Technology General Controls (ITGCs) are essential processes and procedures designed to maintain the confidentiality, integrity, and availability of an organization's IT infrastructure and data. These controls play a vital role in ensuring the overall effectiveness of an organization's IT systems and their compliance with regulatory requirements.
ITGCs can be broadly categorized into four areas:
1. Access Controls: These controls ensure that only authorized individuals can access sensitive information and systems. They include user authentication mechanisms, password policies, and user access rights management.
2. Change Management: Change management controls are put in place to manage and control alterations made to IT systems, applications, and infrastructure. These controls help to prevent unauthorized changes and ensure proper documentation, testing, and approval before any modifications are implemented.
3. Backup and Recovery: Backup and recovery controls ensure that an organization's data is securely stored, easily retrievable, and protected against loss or damage. These controls include regular data backups, offsite storage, and disaster recovery plans.
4. System Development and Maintenance: This area encompasses controls that manage the design, development, and maintenance of IT systems and applications. It includes system development life cycle (SDLC) controls, quality assurance processes, and regular system maintenance and patching.
For more questions on IT systems
https://brainly.com/question/25226643
#SPJ11
If you're under 18 and you receive _____ or more license points in 12 months, you'll be restricted to driving only to school or work for one year.
Answer:
B:6
Explanation:
FLVS :)
Answer: 6 is the correct answer