How to do 4. 3. 9 table reservation code hs

Answers

Answer 1

user_name = input("Hello, what name is the reservation under?")

reservation_name = "Karel"

if user_name == reservation_name:

   print("Right this way!")

else:

   print("Name:", user_name)

   print("Sorry, we dont have a reservation under that name.")

This is a Python code that asks for the user's name and checks it against a pre-defined reservation name "Karel". If the names match, it prints "Right this way!" indicating that the reservation is found. Otherwise, it prints "Sorry, we don't have a reservation under that name." and also prints the user's name.

The first line of the code uses the "input" function to ask the user for their name and store the input in the variable "user_name". The second line sets the pre-defined reservation name to "Karel". The third line starts an "if" statement that checks if the user's name matches the reservation name. If it does, it prints "Right this way!". If it does not match, the "else" statement is executed, printing "Sorry, we don't have a reservation under that name." and the user's name using the "print" function.

Learn more about Python code here: brainly.com/question/30427047

#SPJ4


Related Questions

How can i print an art triangle made up of asterisks using only one line of code. Using string concatenation (multiplication and addition and maybe parenthesis)?

Answers

#include <iostream>

int main(int argc, char* argv[]) {

   //One line

   std::cout << "\t\t*\t\t\n\t\t\b* *\t\t\b\n\t\t\b\b*   *\t\t\b\b\n\t\t\b\b\b*     *\t\t\b\b\b\n\t\t\b\b\b\b*       *\t\t\b\b\b\b\n\t\t\b\b\b\b\b* * * * * *\t\t\b\b\b\b\b\n";

   return 0;

}

Yes, it is possible with a single line and using escape sequences, but it is tedious and not recommended. Instead, you can use loops to write more readable and easy on the eyes code. We only used the cout  method (C++). Good luck!

How can i print an art triangle made up of asterisks using only one line of code. Using string concatenation

You defined a book data type.

class book:
title = ''
author = ''
pages = 0

Then, you created an instance of your book.

myBook = book()

Which statement assigns a value to the title?

title = 'To Kill a Mockingbird'
myBook.title('To Kill a Mockingbird')
myBook.title = 'To Kill a Mockingbird'
myBook.book.title = myBook.title = 'To Kill a Mockingbird'

Answers

Answer:

myBook.title = 'To Kill a Mockingbird'

Explanation:

Correct answer edge 2020

A garments manufacturing company buys various types of natural and synthetic materials to produce clothes. Which material is a synthetic material?

A. cotton
B. nylon
C. jute
D. silk
E. linen

I need this answer please!! 20 points

Answers

a is the correct answer of the question

Answer: A.

Explanation:

in this assignment you will create, implement and test a sequence4.template file. the material from ch1 ~ 6 of the textbook can help you tremendously. the chapter 6 of the text book is focus on template class. you need to spend more time on understanding template prefix, template parameter, typename and etc. i call these (template prefix, template parameter, .etc.) are template stuff. implementing the template class almost the same as implementing a regular class, but you need to add the template stuff in the file and save the file name with a template extension. if you feel confusion with the template stuff in a file you can implement the class as a regular class and add the template stuff at the end of implementation. you are welcome to use more advance skills than the techniques introduce in the textbook to do the assignment.

Answers

As demonstrated below, you can use both keywords: declarations of the functions for the classes T and typename T templates; 3. This may be done in C++ by using template parameters.

Similar to how standard function parameters may be used to send values to a function, template parameters allow you to pass types to a function as well. A template parameter is a specific form of parameter that can be used to pass a type as an argument. It makes no difference whether you write "typename T" or "class T"; programmers who use C++ follow this norm. Personally, I like "typename T" since it more precisely specifies its purpose, i.e., defining a template with a certain type.

Learn more about Template here-

https://brainly.com/question/13566912

#SPJ4

The availability of the appropriate compiler guarantees that a program developed on one type of machine can be compiled on a different type of machine.A. TrueB. False

Answers

A true because for an example do you have a computer and you want and you got a new one and you just want to put everything that was on the computer on it you can just switch the data and then automatically it will go on the other computer.
hope this helps

in debugging mode, what is the keyboard shortcut to continue execution to the next breakpoint (or to the end of the program if no more breakpoints exist)?

Answers

The shortcut that is used to continue execution to the next breakpoint is F5. F5 on keyboard is placed in the above.

A shortcut refers to a link to a thing (such as a file, folder, drive, or program) on your computer. You can make shortcuts and then put them in a convenient place so that you can easily access the thing that the shortcut links to.

There are many aims when you use keyboard shortcuts. For beginners, they can help you work more quickly and efficiently. They can also help you be more productive by letting you to act multiple tasks at once. In addition, keyboard shortcuts can make you lock your screen or switch between windows and apps.

Learn more about shortcut: https://brainly.com/question/11484367

#SPJ4

i) Convert 8GB to bits. Give the expression.

Answers

Answer:

64 billion

Explanation:

1gb = 1 billion bytes

so 8gb = 8 billion bytes

then

1 byte= 8 bits

so 8 billion bytes = 8 × 8 billion bits, 64 billion bits

Which of the following industries utilize computer science?
1. Agriculture
II. Government
III. Music
IV. Healthcare
V. Art
VI. Film

Answers

Answer:

All of them

Explanation:

Agriculture uses it for data and crop yields

Government uses it for economy, and other things like PRISM(Their surveillance)

Music uses it for audio editing and touch-ups

Healthcare uses it for databases and medical science

Art can use it! There is an AI that can paint paintings that look amazing with strokes and everything, and they look just like a human painting.

Film uses it lots, for CGI, animation, data, and countless other things.

almost every industry uses computer science in one way or another.

Which of these is a small'plain text file that a website might place on your local drive? Choose the answer.

cookie

spam

virus

spoof

Answers

The answer would be cookie

Answer:

the is anwer is cookie i took the test i made sure is the right anwers

Explanation:

Description CS city hires M workers who drive water trucks. They spray water on the streets to clean them, and reduce the dust concentration. There are
N
streets in CS city. The city has a dust control plan, which uses a task scheduler to generate a daily cleaning plan. This plan tells each worker what streets they are responsible for, and ideally all streets will be cleaned. For example, the plan tells worker A to clean street 0 to street
3([0,3])
, worker
B
to clean streets
[4,6]
. This plan will clean 7 streets. However, the task scheduler is buggy. Today it tells worker A to clean streets
[0,3]
and tells worker B to clean streets [3, 5]. Someone realizes that two workers cleaned street 3 twice, and no one cleaned street 6. It's your job to write a program to automatically detect the task scheduler's bugs, and report how many streets are not cleaned in today's plan. Input Format The first line contains two integers
M,N
.
M
is the number of workers, and
N
is the number of streets. The following
M
lines are just the plan generated by task scheduler. Each line contains two integers
[L i

,
R i

]. It indicates that worker i should clean street
L i

to
R i

. Output Format One integer, representing how many streets have not been cleaned. Sample Input 27 Sample Input 27 03 35 Sample Output 1 Explanation Worker A cleans streets [0,3], and worker B cleans streets [3,5]. Street 6 is the only street that was not cleaned, so return 1. Input Constraints
50%,1<=M,N<=1000
100%,1<=M,N<=200000

Answers

In contrast to intrastate trucking, interstate trucking requires that you operate a commercial vehicle.

While intrastate trucking refers to the use of a commercial motor vehicle only within a state's borders and does not fall under any of the other definitions of interstate commerce, interstate commerce is the transportation of goods by motor vehicle across state lines (including to leave the country) or you move goods from one location to another inside a state's borders but their final destination is outside the state. By moving items over state lines, you are involved in interstate commerce. Transporting goods just within a single state, with their final destination also being within the state from which they came, is known as intrastate commerce.

Learn more about operates here-

https://brainly.com/question/29645411

#SPJ4

What is the purpose of a web server? What is the purpose of a web browser?

Answers

Answer: the purpose of a web browser is to help answer and needed questions, and to get to sites.

Explanation:

When deciding on what to wear each day, most people do not use the decision-making process.
Please select the best answer from the choices provided
ОТ
F

Answers

Answer:

false

Explanation:

i took the test g

1. what is software ?
2.what is computer ?
3.who is the father of the computer ?
4.what is operating system ?​

Answers

Answer:

A software is just a computer program made up of other several programs that work in conjunction with each other to perform a given task.

A computer is an electronic device that accepts raw data as input and processes it into useful information.

Charles Babbage, the inventor of digital programmable computers, is recognized as the father of computers.

Operating system is a system software that provides an interface by which a user can interact with every service and component in a computer.

Do network packets take the shortest route?

Answers

Answer:

The packet will take a shorter path through networks 2 and 4

Answer:The packet will take a shorter path through networks 2 and 4, but networks 1, 3, and 5 might be faster at forwarding packets than 2 and 4. These are the kinds of choices network routers constantly make.What is shortest path routing in computer networks?

The goal of shortest path routing is to find a path between two nodes that has the lowest total cost, where the total cost of a path is the sum of arc costs in that path. For example, Dijikstra uses the nodes labelling with its distance from the source node along the better-known route.

Explanation:

which command would you use to save and undo table changes?a. save and undob. commit and undoc. save and rollabackd. commit and rollback

Answers

When working with databases, it is essential to know the appropriate commands to save and undo table changes. The terms you should be familiar with are "commit" and "rollback."

The correct command to save and undo table changes is "commit" and "rollback."

Commit: This command is used to save the changes made to a table permanently. When you use the commit command, it ensures that the modifications you have made are stored in the database.Rollback: This command is used to undo the changes made to a table. If you make a mistake or need to revert to a previous state, you can use the rollback command to undo the changes before committing them.

Therefore, the correct answer is option d, "commit" and "rollback." These commands allow you to save and undo table changes effectively, ensuring the proper management of your database.

To learn more about databases, visit:

https://brainly.com/question/30634903

#SPJ11

state the difference between Ms Word 2003, 2007 and 2010​

Answers

Answer:

Difference of File Menu between Word 2003, Word 2007 and Word 2010 There is a few difference of the File menu between Classic Menu for Word 2007/2010 and Word 2003. The File drop down menu in Word 2007 and 2010 includes 18 menu items, while 16 menu items in Word 2003.

Explanation:

if trays or wireways must be shared, the power adn telecom cables must be separated by a(n)

Answers

If trays or wireways must be shared, the power adn telecom cables must be separated by an insulating barrier.

What is telecom cables?

Telecom cables are cables used in telecommunications. They are used to connect telecommunications equipment, such as telephone exchanges, computers and other network-enabled devices. Telecom cables are usually made up of copper or fiber-optic cables and are used to transmit data, audio and video signals. Fiber-optic cables are used for longer distances and provide faster transmission speeds than copper cables. Telecom cables are essential for any type of communication and are used by businesses, governments and individuals to send and receive data. They are also used to connect phone lines, internet services and cable television.

To learn more about telecom cables

https://brainly.com/question/29995005

#SPJ1

Each instruction that the CPU receives contains two parts -
the Opcode (the instruction) and what else?
a) Operation
b) Operand
C) Opportunity
d) Operode​

Answers

E :) ahksksowokskxksos

An online ad that displays in a new window that opens in front of the current window is called a.

Answers

An online ad that displays in a new window that opens in front of the current window is called a pop-up ad.

What is an ad?

Ad or advertising refers to the strategies and methods used to make goods, services, viewpoints, or causes known to the public with the intention of influencing how they react to what is being advertised.

The majority of advertising promotes a product that is available for purchase, but similar techniques are also employed to persuade people, among many other things, to drive defensively, donate to charities, or cast ballots for particular candidates.

The most significant source of revenue for the media outlets through which it is carried out is often advertising (such as newspapers, magazines, or television stations). Advertising has grown to be a significant and significant service industry in the noncommunist world.

Learn more about Advertising

https://brainly.com/question/3163475

#SPJ4

What is a user data?

Answers

Answer:   Any data the user creates or owns.

Explanation:

the user being the one on the otherside of the computer, usually a human.

but examples of user data are intalled programs, uploads, word documents created by user (computer user)

FILL IN THE BLANK. _________ audit trails may be used to detect security violations within an application or to detect flaws in the application's interaction with the system.

Answers

Automated audit trails may be used to detect security violations within an application or to detect flaws in the application's interaction with the system. These trails enable continuous monitoring and assessment of application performance and security, identifying potential issues in real-time.

Audit trails may be used to detect security violations within an application or to detect flaws in the application's interaction with the system. Audit trails provide a record of events and actions taken within an application, which can be used to identify any unauthorized access or modifications. By analyzing the audit trail, security professionals can detect patterns of suspicious behavior or activity that may indicate a security breach. Additionally, audit trails can be used to identify flaws in the application's design or implementation, such as programming errors or configuration issues. By regularly reviewing audit trails, organizations can proactively identify and address security vulnerabilities before they are exploited. Overall, audit trails are an important tool for maintaining the security and integrity of applications, and should be implemented as part of any comprehensive security strategy.

Learn more about Automated audit here-

https://brainly.com/question/29804318

#SPJ11

Which statement best describes a database?

Select one:
a. A collection of related tables.
b. Tables that are in sequence.
c. Tables of related information.
d. A collection of tables.

Answers

I think it's a. A collection of related tables

What is cuny first login?

Answers

CUNY First is an online system used by the City University of New York (CUNY) for students, faculty, and staff to access academic and administrative information and services.

The CUNY First login is the process of entering your username and password to access your account on the CUNY First system. Once you are logged in, you can view your class schedule, grades, financial aid information, and more. It is important to keep your login information secure and not share it with anyone else.

The system allows users to register for classes, check grades, view financial aid information, and view student accounts. CUNY First also provides access to library resources, student services, and various administrative offices. In addition, CUNY First allows users to communicate with faculty and staff members using a secure messaging system.

Learn more about City University of New York at: https://brainly.com/question/29834134

#SPJ11

if she will buy 35 T-shirts 45 pairs of shorts and 25 wind breakers what will be her total cost

Answers

Answer:

105. stack 45, 35, and 25 and add the 5's first. 5-10-15 add the one at the top of the 3. then add the row to the left. and your total will be 105. sorry if this isn't a Great awnser

Okay, guys, I know this one will be very hard however while trying to finish this assignment I got overwhelmed and lost by the sheer size of it! Alrighty! Here are the instructions:
/////////////////////////////////////////////////////////////
Modify the TaxReturn class with fields that hold a taxpayer’s Social Security number (snn), last name (last), first name (first), street address (address), city (city), state (state), zip code (zipCode), annual income (income), marital status (status), and tax liability (tax). Include a constructor that requires arguments that provide values for all the fields other than the tax liability. The constructor calculates the tax liability based on annual income and the percentages in the following table.

Income Single Married
0 - 20,000 15% 14%
20,001 - 50,000 22% 20%
50,001+ 30% 28%

In the TaxReturn class, also include a display method that displays all the TaxReturn data.

Implement the PrepareTax application that prompts a user for the data needed to create a TaxReturn. Continue to prompt the user for data as long as any of the following are true:

• The Social Security number is not in the correct format, with digits and dashes in the appropriate positions—for example, 999-99-9999.

• The zip code is not five digits.

• The marital status does not begin with one of the following: S, s, M, or m.

• The annual income is negative.

After all the input data is correct, create a TaxReturn object and then display its values.

An example of the program is shown below:

Enter your Social Security number
999-99-9999
Enter your first name
Jane
Enter your last name
Doe
Enter your address
1961 Mulberry Street
Enter your city
Springfield
Enter your state
Massachusetts
Enter your Zip code
01101
Enter marital status
Single
Enter your annual income
20000
Taxpayer ssn: 999-99-9999 Jane Doe
1961 Mulberry Street
Springfield, Massachusetts 01101
Marital status: S
Income: $20000.0 Tax: $3000.0
////////////////////////////////////////////////////////////////
I also want to point out that this assignment has two different files with one being PrepareTax.java and the other being ReturnTax.java!

Answers

Enter your information ℹ️

TaxReturn.java: Pt. 3

// Write your code here

}

public void display() {

System.out.println("Taxpayer ssn: " + ssn + " " + first + " " + last + "\n" +

address + "\n" + city + ", " + state + " " + zipCode +

"\n Marital status: " + status + "\n" +

"Income: $" + income + " Tax: $" + tax);

What is program?

A computer can run multiple programs simultaneously, and each program can be in a different state. There are three states a program can be in: running, blocked, and ready. If a program is running, it means that it is currently using the computer's resources, such as the processor, memory, and I/O devices, to perform its tasks.

On the other hand, if a program is blocked, it means that it is waiting for a resource to become available, such as a file, network connection, or input from the user. In the scenario you mentioned, "Program A" is in the running state, meaning it is actively using the computer's resources.

Therefore, Program B" is in the blocked state, meaning it is waiting for a resource to become available so it can continue to run.

Learn more about program on:

brainly.com/question/30613605

#SPJ3

chapter 2 discussion questions 199199 unread replies.199199 replies. answer the following questions from chapter 2: how does decomposing a user story into scenes and shots help you organize the components of an alice program? what is the difference between a scene method and a class method? what is the value of adding comments to a program? what is meant by the assertion that an alice object has six degrees of freedom?

Answers

Other languages frequently refer to a class method as a static method. one that is callable even in the absence of a class instance.

Explain about the class method?

Rather than being connected to an object, a class method is one that is bound to the class. Unlike staticmethod, it doesn't necessitate the construction of a class instance. A class method differs from a static method in that: The only thing that a static method interacts with is the parameters; it has no knowledge of the class.

Class methods are often helpful when we need to access the class itself, such as when we want to create a factory method, which is a function that makes instances of the class. So class methods can act as substitute constructors. All objects that belong to a class can use the same method. A class method can be called by passing the class as the first argument.

To learn more about the class method refer to:

https://brainly.com/question/20216706

#SPJ4

How many words is 3 pages double spaced times new roman 12?.

Answers

Have a good day tomorrow babe love love babe love baby babe love you baby baby babe babe

A Department of Defense (DoD) security team identifies a data breach in progress, based on some anomalous log entries, and take steps to remedy the breach and harden their systems. When they resolve the breach, they want to publish the cyber threat intelligence (CTI) securely, using standardized language for other government agencies to use. The team will transmit threat data feed via which protocol

Answers

Answer: no se

Explanation:

Elsa wants to save her work at the office to be continued at home either on a pen drive or CD. Outline three reasons why she will choose the pen drive over the CD​

Answers

Answer:

Pen Drive offers more accessibility

Not every device is equipped with a CD player but every device has a USB port for a pen Drive. Saving on the pen Drive will therefore enable the data to be more accessible.

Pen Drive has more space.

CDs usually have a storage capacity of below a gigabyte whilst pen drives can reach up to 2 terabytes thereby offering exponentially more space to save data.

Safety of Data

CDs are more prone to damage as data could be lost if the CD is scratches. Pen Drives on the other hand are encased in an outer case that protects the data.

What is ed-tech? Because we are doing a project in computers.

Answers

Answer:

"Educational technology is the combined use of computer hardware, software, and educational theory and practice to facilitate learning. When referred to with its abbreviation, EdTech, it is often referring to the industry of companies that create educational technology."

Explanation:

Other Questions
Explain the risks associated with leveling resources, compressing or crashing projects, and imposed durations or "catch-up" as the project is being implemented. Why is it critical to develop a time-phased baseline? Subscribe to unlock Select the correct text in the passage.Which specific details shape the central idea that Joshua trees are important to the Mojave Desert ecosystem?[6] Today we enjoy this yucca for its grotesque appearance, a surprising sight in the landscape of biological interest. TheJoshua tree's life cycle begins with the rare germination of a seed, its survival dependent upon well-timed rains. Look forsprouts growing up from within the protective branches of a shrub. Young sprouts may grow quickly in the first five years,then slow down considerably thereafter. The tallest Joshua trees in the park loom a whopping forty-plus feet high, a grandpresence in the desert. Judging the age of a Joshua tree is challenging: these "trees" do not have growth rings like youwould find in an oak or pine. You can make a rough estimate based on height, as Joshua trees grow at rates of one-halfinch to three inches per year. Some researchers think an average lifespan for a Joshua tree is about 150 years, but someof our largest trees may be much older than that....[7] Many birds, mammals, reptiles, and insects depend on the Joshua tree for food and shelter. Keep your eyes open forthe yellow and black flash of a Scott's oriole busy making a nest in a yucca's branches. At the base of rocks, you may finda wood rat nest built with spiny yucca leaves for protection. As evening falls, the desert night lizard begins poking aroundunder the log of a fallen Joshua tree in search of tasty insects. The map part that shows what the map symbols mean In the paragraph box below, type a sentence following the sentence pattern provided.subject-verb All pies at the baked goods booth were cut into eighths. When Justina Hartleys sift in the boot began, there were eight and one forth pies waiting to be sold. At the end of her shift there were only five pieces of apple pie left. How many pieces of apple pie were sold during Justinas shift? A restaurant offers 8 appetizers and 10 main courses. in how many ways can a person order a two-course meal? he police was able to identify the outgoing numbers dialed by an individual that was under investigation by using the electronic pulses of the phone. Which of the following is likely the device the police used?A. Crime scene technologyB. Less-lethal device technologyC. Information TechnologyD. Database Technology Why did Billy decide to trust the landlady ?????? can someone help me? please adolescents tend to rely more on ______ thinking than adults do. A hot-air balloon is tied to the ground with two taut ropes. One rope is directly under the balloon and makes a right angle with the ground. The other rope forms an angle of 60 with the ground. Which statements are correct?A) d 60 ft.B) d 66 ft.C) h 104 ft.D) h 108 ft.E) angle of depression = 30 the sexually transmitted disease characterized by painful genital ulcers is trachoma. gonorrhea. chancroid. syphilis. pie in the sky aircraft inc. files a suit against quest engineering inc., claiming that the consideration for their contract is inadequate. the court will most likely not examine the adequacy of the consideration if_____ he method of ethical reasoning that deals with making decisions after considering the interests of others is: multiple choice egoism enlightened egoism utilitarianism rights theory The prefix meaning outside or outer is which of the following? (A) Ana- (B) Dia- (C) Epi- (D) Exo- (E) Peri- using ladder operators find and for the state|s> = A(|011> + 2i|101> +3exp(i(pi)/4)|210>) which values are solutions 4x greater than or equal to 35write all thats correct 5 over 1/212-158 over 3/410 g Lactate dehydrogenase is a tetrameric enzyme (144kDa) that catalyzes conversion of pyruvate into lactate to regenerate NAD in oxygen depleted muscles. a) Why in anaerobic conditions, is NADH oxidized by lactate dehydrogenase the doctrine that u.s. interests are best served by minimizing u.s. involvement in international affairs (particularly european affairs) is pls answer I mark brainliest