The Web was initially just text, which was incredibly boring. Thankfully, it didn't take long for the option to include photographs (as well as other more intriguing sorts of material) inside web pages.
What does a website rollover image mean?Rollovers are graphic elements that improve the aesthetics of a website and convey navigational information. As an indication that the picture is a link and can take the visitor to another part of the website, the Rollover changes when the user's mouse moves over the image.
What does HTML rollover mean?When a user rolls their mouse pointer over a graphical picture, rollover is a JavaScript technique used by Web developers to create the desired effect. The term "rollover" can also refer to a button on a website that enables user and website interaction.
to know more about rollover here:
brainly.com/question/28902915
#SPJ1
You can use the delete key to clear cell contents true or false
Answer: True
Explanation:
What feature of a server makes it a potential and likely target of hacker attacks?
Answer:
The feature of a server that makes it a potential and likely target of hacker attacks is it network capability.
Hackers are interested in attacking as many computers as possible. Therefore, their best target is a server that serves the networked resources, computers, and systems. From that point, their malwares can be distributed easily and smoothly to unsuspecting computer stations so that they in turn start replicating the malware and also malfunction.
Explanation:
Bear in mind that a server manages all network resources. The storage capability resides in a server. The security settings are usually installed in the server to serve all networked devices and systems. It is from the server that all systems are administered. Servers are usually dedicated to their server roles and nothing else.
Write a Java class called BankAccount (Parts of the code is given below), which has two private fields: name (String) and balance (double), and three methods: deposit(double amount), withdraw(double amount) and toString(). Write the necessary constructors, accessor methods and mutator methods. The deposit() method adds the amount to the account causing the current balance to increase, withdraw() method subtracts the amount causing the current balance to decrease and toString() method should return the name and the current balance separated by a comma. For example, if you print out the object with name Jake and balance 40.0 then it should print:
Answer:
Here is the Bank Account class:
public class Bank Account { //class definition
private String name; //private String type field to hold name
private double balance; // private double type field to hold balance
public Bank Account(String name, double balance) { // parameter constructor that takes
//this keyword is used to refer to the data members name and balance and to avoid confusion between name, balance private member fields and constructor arguments name, balance
this.name = name;
this.balance = balance; }
public void deposit(double amount) { //method to deposit amount
balance = balance + amount; } // adds the amount to the account causing the current balance to increase
public void withdraw(double amount) { //method to withdraw amount
balance = balance - amount; } //subtracts the amount causing the current balance to decrease
public String toString() { // to display the name and current balance
return name + " , $" + balance; } } //returns the name and the current balance separated by a comma and dollar
Explanation:
The explanation is provided in the attached document due to some errors in uploading the answer.
Where do you interact with databases on a daily basis?
Your grocery store, bank, video rental store and favorite clothing store all use databases to keep track of customer, inventory, employee and accounting information. Databases allow for data to be stored quickly and easily and are used in many aspects of your daily life.
Answer:
okay so things I interact with daily would be my water bottle, the fridge, my computer, my TV, and the toilet
-NULL
Brainliest will be appreciated thank you!
In spite of the need for "clean" information, many organizations have databases with duplicate records for you. You've probably experienced the consequences of this by receiving two identical pieces of junk mail from the same company. One record in the database may have your middle initial while the other doesn't, or there is some other type of minor discrepancy. Why would organizations go through a process of cleaning their database information?
Hellppppppp
Answer:
coke,pepsi,sprite,rc,mountaindew
Cleaning up databases helps organizations improve cost efficiency, accuracy and consistency, data analysis, and legal and regulatory compliance.
What are databases?A database is the organized and structured collection of data. It helps to easily access, manage and update the available data. Organizations go through a process of cleaning their database information for several reasons:
Cost efficiency: By cleaning up their databases, organizations can save money by eliminating these redundancies.Accuracy and consistency: Duplicate records can lead to errors and inconsistencies in the data. This can lead to a poor customer experience and decreased trust in the organization.Data analysis: By cleaning up their databases, organizations can ensure that their data is accurate and reliable for analysis and decision-making.Legal and regulatory compliance: Certain industries or jurisdictions have legal or regulatory requirements for data management, including the removal of duplicate records.In summary, cleaning up databases helps organizations improve cost efficiency, accuracy, and consistency.
Learn more about databases, here:
https://brainly.com/question/30634903
#SPJ2
AUPs ensure that an organization’s network and internet are not abused. Select 3 options that describe AUPs.
connecting to unauthorized devices through the network
going onto unauthorized sites or downloading certain content
not sending spam or junk emails to anyone
not using the service to violate any law
reporting any attempt to break into one’s account
AUPs often involves not going onto unauthorized sites or downloading certain content, not using the service to violate any law, and not connecting to unauthorized devices through the network.
What is AUP?AUP stands for Acceptable Use Policy, which refers to a policy that regulates users when they access a corporate newtork.
How does an AUP regulates users?Most AUPs imply:
Users can only access certain sites and dowloading specific content is forbidden.The access to the internet or network cannot be used for criminal purposes.Only authorized users can connect to the corporate network.Learn more about AUP in: https://brainly.com/question/9509517
#SPJ1
Answer:
not sending spam or junk emails to anyone
not using the service to violate any law
reporting any attempt to break into one’s account
Explanation:
A client has the right to receive ethically conducted research. Discuss this statement with examples.
A client has the right to receive ethically conducted research. This means that the researcher should adhere to the principles of scientific research, which includes honesty, objectivity, integrity, and respect for human subjects. In addition, the researcher should ensure that the research is conducted in a safe and responsible manner.
What is research?
Research is defined as "creative and methodical activity done to improve the body of knowledge." It entails the objective gathering, organising, and analysis of data in order to improve comprehension of a subject or issue. A research effort could build on prior contributions to the field. Research may duplicate portions of earlier projects or the project as a complete to verify the accuracy of instruments, processes, or experiments.
Documentation, discovery, interpretation, as well as the research and development (R&D) of methods & systems again for advancement of human knowledge are the main goals of basic research (as opposed to applied research). Research methodologies are based on epistemologies, which differ greatly within and between the humanities and sciences.
To learn more about research
https://brainly.com/question/25257437
#SPJ13
HOMEWORK: Bud, Not Buddy I NOTICE... What do you see? chpter 3-4
Answer:
Check Explanation for Chapter 3 - 4 Summary!
Explanation:
Chapter 3:
Bud tries hard not to panic in the pitch-black darkness of the shed. The eyeballs of three dried-out fish heads stare back at him as he tries the doorknob, which he hopes Mr. Amos only pretended to lock. While deciding where to lay his blanket and pillow, he remembers the story of the cockroach crawling into his best friend’s ear back at the Home. From the story his friend, Bugs, tells, the cockroach was yelling, “My legs! My legs! Why have they done this to my legs?” while adults tried to extract it with tweezers. Bud wants to avoid any encounters with the cockroaches that are surely crawling over the shed’s floor, ready to crawl in his ears. He spreads his blanket on the top of the woodpile and climbs up.
Bud attacks the bat with a rake, only to discover that he has disturbed a hornet’s nest. Hornets sting him as he grabs for the doorknob hoping for escape. In his haste, he forgets about the fish heads with their razor-like teeth. He screams as the teeth cut into him, and the hornets continue to sting. He manages to escape through a window above the wood pile and falls to the ground, slapping at the hornets still attacking him. He heads towards the Amoses’ house, set on revenge.
Chapter 4 Summary:
Bud climbs into the Amoses’ house through an unlocked window. He finds his suitcase still under the kitchen table and puts it on the back porch step. Back in the house, he grabs Mr. Amoses’ shotgun and hides it outside, so if the Amoses wake up, they wouldn’t use it on him.
Bud returns to the kitchen. He fills a glass with warm water and heads up to Todd’s room. Todd is sound asleep. Bud dips Todd’s fingers in the warm water, hoping he’ll wet his bed. When he doesn’t, Bud pours the water on Todd’s pajama pants, causing Todd to soak his sheets. Bud creeps out of the house, grabs his suitcase, and heads toward the road, now “on the lam ... just like Public Enemy Number One.”
Hope this helps! Let me know if you have any questions! :)
A collection of programs which make computer work:--------
This collection of programs, named the operating system, is as important to the process of a computer system as its hardware.
What is a collection of programs known as?A collection of program that governs how your computer system runs and processes information is called Compiler. Computer network A group of. computing devices that are connected in. different ways in order to communicate and. share resources.The another term for computer programs is software system, software program, software package, software, Computer Software, packageWhat is the extensive collection of computer called?
A network is a collection of computers or others types of hardware, which is joined by communication channels that allow sharing of resources and information.
To learn more about operating system, refer
https://brainly.com/question/22811693
#SPJ9
Which part of the Result block should you evaluate to determine the needs met rating for that result
To know the "Needs Met" rating for a specific result in the Result block, you should evaluate the metadata section of that result.
What is the Result blockThe assessment of the metadata section is necessary to determine the rating of "Needs Met" for a particular outcome listed in the Result block.
The metadata includes a field called needs_met, which evaluates the level of satisfaction with the result in terms of meeting the user's requirements. The needs_met category usually has a score between zero and ten, with ten implying that the outcome entirely fulfills the user's demands.
Learn more about Result block from
https://brainly.com/question/14510310
#SPJ1
We can sell the Acrobat Reader software to the other users”. Do you agree with this statement? Justify your answer.
No, as a User, one CANOT sell Acrobat Reader software to the other users.
What is Adobe Reader?Acrobat Reader is a software developed by Adobe and is generally available as a free PDF viewer.
While individuals can use Acrobat Reader for free,selling the software itself would be in violation of Adobe's terms of use and licensing agreements.
Therefore, selling Acrobat Reader to other users would not be legally permissible or aligned with Adobe's distribution model.
Learn more about Adobe Reader at:
https://brainly.com/question/12150428
#SPJ1
Question 5 / 15
What does clicking and dragging the fill handle indicated by the cursor below do?
077
Х
✓ fx
=0.08*B77
B.
с
76
Sales
Tax
77
$794
$64
78
$721
79
$854
80
$912
81
$1,020
Answer:
$1,020 that is my answer because it will be that one
The value that would be returned based on the formula [=COUNTIF(A43:A47, "NP*")] in cell A49 is 4.
Microsoft Excel can be defined as a software application that is designed and developed by Microsoft Inc., so as to avail its end users the ability to analyze and visualize spreadsheet documents.
In Microsoft Excel, there are different types of functions (predefined formulas) and these include:
Sum functionAverage functionMinimum functionMaximum functionCount functionA count function is typically used to to calculate the number of entries in a cell or number field that meets a specific (predefined) value set by an end user.
In this scenario, "NP*" is the specific (predefined) value that was set and as such the value that would be returned based on the formula in cell A49 is 4 because A43, A44, A45 and A46 contain the value "NP."
Read more on Excel formula here: https://brainly.com/question/25219289
You work part-time at a computer repair store. You are building a new computer. A customer has purchased two serial ATA (SATA) hard drives for his computer. In addition, he would like you to add an extra eSATA port that he can use for external drives. In
Install an eSATA expansion card in the computer to add an extra eSATA port for the customer's external drives.
To fulfill the customer's request of adding an extra eSATA port for external drives, you can install an eSATA expansion card in the computer. This expansion card will provide the necessary connectivity for the customer to connect eSATA devices, such as external hard drives, to the computer.
First, ensure that the computer has an available PCIe slot where the expansion card can be inserted. Open the computer case and locate an empty PCIe slot, typically identified by its size and the number of pins. Carefully align the expansion card with the slot and firmly insert it, ensuring that it is properly seated.
Next, connect the power supply cable of the expansion card, if required. Some expansion cards may require additional power to operate properly, and this is typically provided through a dedicated power connector on the card itself.
Once the card is securely installed, connect the eSATA port cable to the expansion card. The cable should be included with the expansion card or can be purchased separately if needed.
Connect one end of the cable to the eSATA port on the expansion card and the other end to the desired location on the computer case where the customer can easily access it.
After all connections are made, close the computer case, ensuring that it is properly secured. Power on the computer and install any necessary drivers or software for the expansion card, following the instructions provided by the manufacturer.
With the eSATA expansion card installed and configured, the customer will now have an additional eSATA port available on their computer, allowing them to connect external drives and enjoy fast data transfer speeds.
For more question on computer visit:
https://brainly.com/question/30995425
#SPJ8
write a visual basic program to delete first character from the string every time when clicking on the command delete. using function.
Answer:
Private Sub Command1_Click()
Dim str As String
str = Text1.Text
str = Mid(str, 2)
Text1.Text = str
End Sub
Explanation:
Which statement is valid with respect to configuring the Oracle Cloud Infrastructure (OCI) API Gateway?
A single gateway can only be deployed in a private OCI VCN subnet.
A single gateway can be deployed in both a public and private OCI Virtual Cloud Network (VCN) subnet.
A single gateway can be deployed in either a public or private OCI VCN subnet.
A single gateway can only be deployed in a public OCI VCN subnet.
The statement that is valid with respect to configuring the Oracle Cloud Infrastructure (OCI) API Gateway is: "A single gateway can be deployed in either a public or private OCI VCN subnet."
What is OCI Gateway?OCI API Gateway can be deployed in either public or private subnets within a Virtual Cloud Network (VCN). Deploying the gateway in a public subnet allows the gateway to be accessible from the internet, while deploying it in a private subnet restricts access to the gateway only from resources within the same VCN or through a VPN connection. The choice of subnet type depends on the specific use case and security requirements.
Internet, NAT, service, and dynamic routing gateways are examples of gateways in OCI. Data can move from one network to another with the help of a gateway, a network component. It serves as a gate between two networks, as suggested by its name, as all data entering or leaving a network must pass through it.
To know more about OCI VCN visit:-
brainly.com/question/30541561
#SPJ1
Compare and contrast frame header to internet protocol header.
A Frame Header is known to have the source and the destination addresses of all the frame and the control bytes while the IP header is known to be the header information at the start of an Internet Protocol packet.
The IP packets is made up of a header that is used for addressing and routing.What is IP header?This type of header is known to have the source address and the destination address. IP is known to be one that uses an Internet datagram that has all the information that are the same to the physical frame.
A frame is regarded as the unit of transmission that is found on a link layer protocol. It is made up of a link layer header that is known to be followed by a packet.
Learn more about IP header from
https://brainly.com/question/4297610
Review how to write a for loop by choosing the output of this short program.
for counter in range(3):
print(counter * 2)
2
3
4
0
2
4
0
1
2
2
4
6
Answer:
The answer is 0 2 4. I hope this helps you out. Have a wonderful day and stay safe.
Explanation:
Answer: 0 2 4
Explanation: got it right on edgen
bills is replacing a worn-cut cable to his power table saw.what type of cable is he most likely using ?
A.PSC
B.SO
C.CS
D.HPD
Bill is replacing a worn-cut cable for his power table saw. is using is A. PSC (Portable Cord).
What is the bills?Working with frayed cables can be dangerous and may act as a form of a risk of electric shock or other hazards. To make a safe and successful cable replacement, there are some general steps Bill can follow.
A is the most probable type of cable he is utilizing from the provided choices. A type of cord that can be easily carried or moved around. Flexible and durable, portable cords are frequently utilized for portable power tools and equipment.
Learn more about bills from
https://brainly.com/question/29550065
#SPJ1
Help pls....
I need some TYPES
and some KINDS
of computers
Answer:
Mainframe Computer. It is high capacity and costly computer.
Super Computer. This category of computer is the fastest and also very expensive.
Workstation Computer. The computer of this category is a high-end and expensive one.
Personal Computer (PC)
Apple Macintosh (Mac)
Laptop computer (notebook)
Tablet and Smartphone
Explanation:
I need help with this question!!
Answer:
True
Explanation:
it just to make sense
4.14 LAB: Countdown until matching digits In C++ Write a program that takes in an integer in the range 20-98 as input. The output is a countdown starting from the integer, and stopping when both output digits are identical. Ex: If the input is: 93 the output is: 93 92 91 90 89 88 Ex: If the input is: 77 the output is: 77 Ex: If the input is: 15 or any value not between 20 and 98 (inclusive), the output is: Input must be 20-98 For coding simplicity, follow each output number by a space, even the last one. Use a while loop. Compare the digits; do not write a large if-else for all possible same-digit numbers (11, 22, 33, …, 88), as that approach would be cumbersome for larger ranges.
Answer:
Here is the C++ program:
#include <iostream> // to use input output functions
using namespace std; // to identify objects like cin cout
int main() { //start of main function
int number; //an integer value
cout<<"Enter an integer: "; //prompts user to enter a number
cin >> number; // reads integer value from user
if (number > 98 || number < 20) { //if number is not between 20 and 98
cout<<"Input must be 20-98"; } //display this message if number is not between 20 and 98
else { // if number is in range 20-98
while(number%11){ // loop keeps taking mod of input number with 11 until matching digits found
cout<<number<<" "; //displays the numbers
number--; } // decrements the value of number by 1
cout<<number<<" "; } } // displays the matching digits
Explanation:
I will explain the program with an example:
Let suppose the number = 90
The if condition evaluate to false because 90 is in the range of 20-98 so the else part executes which has a while loop that works as following:
while(number % 11)
At first iteration:
This while(number % 11) is basically equivalent to :
while(number % 11 != 0)
while(90 % 11)
The % operator is the modulo operator which returns the remainder of the division. So when 90 is divided by 11 the remainder is 2. This is not equal to 0. So the statement under while condition executes:
cout<<number<<" "; This statement displays the number on output screen. Since number = 90 so 90 is printed. " " adds a space with the number
90
Next the value of number is decremented to 1 so number = 89
At second iteration:
while(number % 11) becomes:
while(89 % 11)
When 89 is divided by 11 the remainder is 1. This is not equal to 0. So the statement under while condition executes:
cout<<number<<" "; This statement displays the number on output screen. Since number = 89 so 89 is printed. " " adds a space with the number
90 89
Next the value of number is decremented to 1 so number = 88
At third iteration:
while(number % 11) becomes:
while(88 % 11)
When 89 is divided by 11 the remainder is 0. So the while loop breaks because the condition while(number % 11 != 0) evaluates to false. So the statement in while loop does not execute and program control moves to the following statement:
cout<<number<<" "; This statement displays that number whose digits match on the output screen with a space. So the output of the entire program is:
90 89 88
The program along with the output using example given in the question i.e. input is 93 is attached in a screenshot.
Name the processes that the information processing cycle consist of:
Answer:
Hello Dear!...Explanation:
The information-processing cycle consists of four basic operations: input, processing, output, and storage.
Hope that helps you Buddy..
Buhbye!
Take care!
Look at the following Polygon class:
public class Polygon
{
private int numSides;
public Polygon()
{
numSides = 0;
}
public void setNumSides(int sides)
{
numSides = sides;
}
public int getNumSides()
{
return numSides;
}
}
Write a public class named Triangle that is a subclass of the Polygon class. The Triangle class should have the following members:
a private int field named base
a private int field named height
a constructor that assigns 3 to the numSides field and assigns 0 to the base and height fields
a public void method named setBase that accepts an int argument. The argument's value should be assigned to the base field
a public void method named setHeight that accepts an int argument. The argument's value should be assigned to the height field
a public method named getBase that returns the value of the base field
a public method named getHeight that returns the value of the height field
a public method named getArea that returns the area of the triangle as a double.
Use the following formula to calculate the area: Area = (height * base) / 2.0
Answer: This is the complete program for this with the highest level of explanation.
This program is written in the Java programming language.
The name of this file is Triangle.java
public class Triangle extends Polygon {
// private fields to store the dimensions of the triangle
private int base;
private int height;
// constructor to initialize the fields and set the number of sides
public Triangle() {
// call the setNumSides method inherited from Polygon to set the number of sides to 3
setNumSides(3);
// initialize base and height to 0
base = 0;
height = 0;
}
// setter method for the base field
public void setBase(int b) {
base = b;
}
// setter method for the height field
public void setHeight(int h) {
height = h;
}
// getter method for the base field
public int getBase() {
return base;
}
// getter method for the height field
public int getHeight() {
return height;
}
// method to calculate and return the area of the triangle
public double getArea() {
// calculate the area using the formula (base * height) / 2.0
return 0.5 * base * height;
}
}
The name of this file is Polygon.java
public class Polygon {
private int numSides;
public Polygon() {
numSides = 0;
}
public void setNumSides(int sides) {
if (sides == 3) {
numSides = sides;
} else {
System.out.println("Error: Invalid number of sides for a triangle");
}
}
public int getNumSides() {
return numSides;
}
}
The name of this file is Main.java
import java.util.Scanner;
public class Main {
public static void main(String[] args) {
Scanner scanner = new Scanner(System.in);
// Create a new Polygon object and set its number of sides to 3
Polygon polygon = new Polygon();
polygon.setNumSides(3);
// Print out the number of sides of the polygon
System.out.println("Number of sides: " + polygon.getNumSides());
// Obtain input from user for the base and height of a triangle
System.out.print("Enter the base of the triangle: ");
int base = scanner.nextInt();
System.out.print("Enter the height of the triangle: ");
int height = scanner.nextInt();
// Create a new Triangle object and set its base and height
Triangle triangle = new Triangle();
triangle.setBase(base);
triangle.setHeight(height);
// Calculate the area of the triangle and print it out
double area = triangle.getArea();
System.out.println("Area of the triangle: " + area);
}
}
This will be the output generated by this program.
Number of sides: 3
Enter the base of the triangle: 10
Enter the height of the triangle: 15
Area of the triangle: 75.0
Step 2/2
This is the complete explanation for this program.
This Triangle class is a subclass of the Polygon class, which means it inherits all of the methods and variables of the Polygon class.
This Triangle class has two private instance variables: base and height. These variables are used to store the dimensions of the triangle.
This Triangle class has a constructor that initializes the number of sides to 3 and sets the base and height variables to 0.
This Triangle class has four public methods:
a. This set Base method, which sets the value of the base variable to the given value.
b. This set Height method, which sets the value of the height variable to the given value.
c. This get Base method, which returns the value of the base variable.
d. The get Height method, which returns the value of the height variable.
Explanation:
This triangle class has a public get Area method that calculates the area of the triangle using the formula (base * height) / 2.0 and returns the result as a double.
Final answer
This is the image of the output generated by this code.
This is the image of the final output.
This is the complete summary of the entire program.
This program defines two classes: Polygon and Triangle. The Polygon class has one private instance variable, num Sides, and three public methods: Polygon(), set Num Sides(int sides), and get Num Sides (). The Triangle class is a subclass of the Polygon class and features two private instance variables, base and height, as well as six public methods: Triangle (), set Base(int base), set Height(int height), get Base (), get Height (), and get Area ().
The Main class is used to build a Triangle class object and to gather user input for the triangle's base and height. The set Base and set Height methods are used to set the values of the base and height instance variables, respectively.
Answer:
public class Triangle extends Polygon {
private int base;
private int height;
public Triangle() {
setNumSides(3);
base = 0;
height = 0;
}
public void setBase(int baseValue) {
base = baseValue;
}
public void setHeight(int heightValue) {
height = heightValue;
}
public int getBase() {
return base;
}
public int getHeight() {
return height;
}
public double getArea() {
double area = (height * base) / 2.0;
return area;
}
}
Hope This Helps
Order the steps to add a recommended chart in excel.
1.Select the data you want to use for your chart.
2.Click Insert > Recommended Charts.
3. On the Recommended Charts tab, scroll through the list of charts that Excel recommends for your data, and click any chart to see how your data will look.
4. When you find the chart you like, click it > OK.
5. Use the Chart Elements, Chart Styles, and Chart Filters buttons next to the upper-right corner of the chart to add chart elements like axis titles or data labels, customize the look of your chart, or change the data that’s shown in the chart.
6. To access additional design and formatting features, click anywhere in the chart to add the Chart Tools to the ribbon, and then click the options you want on the Design and Format tabs.
Please mark brainliest.
Answer:
select the data set , click on insert tab, view recommended charts, view a live preview of the chart and select the chart and click ok
Explanation:
edge
Please answer this, don't skip please. I would really appreciate if you had knowledge over this question and helped out :)
1) The tag is the second of two main parts of a web page. The information between the opening and closing tag is seen by web page visitors in the browser window. True or False
2) The area is the first of two main parts of a web page. The header is where the operation code resides. True or False
3) The next tag is the tag - the head is the first of two main parts of a web page. The head is where the operation code resides. True or False
Answer:
1) they are only visible to the to the person/people who are running the website. therefore the answer to that statement is false.
2) they operation code of a website resides at the end of a address, therefore that statement is also false
Explanation:
Which of these statements performs real number quotient division using type casting?
double x = 35 % 10:
double x = 35 / 10;
double x = 35.0 / 10.0;
double x = (double) 35 / 10;
double x = 35.0 % 10.0;
Answer:
Double x = 35 / 10;
Explanation:
Java provides simple data types for representing integers, real numbers, characters, and Boolean types. These types are known as _ or fundamental types.
<3
Your program has a loop. You want to pass control back to the start of a loop if a certain condition is met.
What statement will keep you in the loop but skip the rest of the code in the loop?
continue
exit
quit
break
Answer:
continue
Explanation:
Write a program that asks the user how many frisbees they would like to buy, and then prints out the total cost. You should declare a constant at the top of your program called COST_OF_FRISBEE and set it equal to $15. Remember, constants should be formatted with all capital letters.
Be sure to include comments that describe the program’s behavior which is how the program functions and how the user interacts with it.
in python programming
#define the price of a frisbee
COST_OF_FRISBEE = 15
#get the number of frisbees the customer wants
frisnum = int(input("How many frisbees do you want: "))
#output cost
print(frisnum, "frisbees will cost", frisnum*COST_OF_FRISBEE)
Write and execute a query that will determine the average number of days that automobiles are rented. Show your result broken out by makes. Do not include an automobile if it has not yet been returned.
Using the knowledge in computational language in SQL it is possible to write a code that query that will determine the average number of days that automobiles are rented
Writting in SQL:select Customer.CID,CName,Age,Resid_City,BirthPlace,
Rentcost.Make,Cost,Rentals.Rtn,Date_Out,Pickup,Date_returned,Return_city
from Customer,Rentcost,Rentals where
Customer.CID=Rentals.CID and Rentcost.Make=Rentals.Make
order by Customer.CID, Rentcost.Make asc;
select Customer.CID,CName from Customer,Rentals where Customer.CID=Rentals.CID
and Pickup='Cary';
select distinct(CName),age from Customer,Rentals where Customer.CID=Rentals.CID
and Return_city='Erie' order by CName asc;
select Customer.CID,CName from Customer,Rentals where Customer.CID=Rentals.CID
and Return_city is null;
select CName from Customer,Rentals where Customer.CID=Rentals.CID
and Resid_City=Pickup;
See more about SQL at brainly.com/question/13068613
#SPJ1
For a quick analysis of the individual amenities, you will add Sparklines.
In cell range H5:H11, add Column Sparklines that chart the advertising expense by amenity type over the months January to June.
Apply the style Dark Blue Sparkline Style Accent 5, Darker 50%.
See how to utilise sparklines to represent your data visually and demonstrate data trends. Use check marks to draw attention to certain values in the Sparkline chart.
What do Excel sparklines serve?Sparklines are tiny graphs that show data graphically in spreadsheet cells. Sparklines can be used to draw attention to the highest and lowest values as well as patterns in a variety of values, such as seasonal peaks or valleys or business cycles. A sparkline should be placed as close as possible to its data.
What kind of sparklines are these?Sparklines come in three varieties: Line: creates a line graph out of the data. Similar to a clustered column chart, column: visualises data as columns. Win/Loss: This method uses colour to represent the data as either positive or negative.
To know more about Sparklines visit:-
https://brainly.com/question/31441016
#SPJ1