The user interface contains two types of user input controls: TextInput, which accepts all characters and Numeric Input, which accepts only digits.
1. Implement the class TextInput that contains:
O Public method def add(c : Char) - concatenates the given character to the current value
O Public method def getValue(): String - returns the current value
Implement the class NumericInput that:
O Inherits from TextInput
O Overrides the add method so that each non-numeric character is ignored
For example, the following code should output "10":
$input = new NumericInput();
$input->add('1');
$input->add('a');
$input->add('0');
echo $input->getValue();
The code skeleton is provided below:
<?php
class TextInput
{
}
class Numericinput
{
{
//$input = new NumericInput();
//$input->add('1');
//$input->add('a');
//$input->add('0');
//echo $input->getValue();

Answers

Answer 1

Answer:

Explanation:

public class Main

{

private static String val; //current val

public static class TextInput

{

public TextInput()

{

val= new String();

}

public void add(char c)

{

if(val.length()==0)

{

val=Character.toString(c);

}

else

{

val=val+c;

}

}

public String getvalue()

{

return val;

}

}

public static class NumericInput extends TextInput

{

Override

public void add(char c)

{

if(Character.isDigit(c))

{

//if character is numeric

if(val.length()==0)

{

val=Character.toString(c);

}

else

{

val=val+c;

}

}

}

}

public static void main(String[] args)

{

TextInput input = new NumericInput();

input.add('1');

input.add('a');

input.add('0');

System.out.println(input.getvalue());

}

}


Related Questions

Write a program that uses a loop with a sentinel value to find the sum of the values input. Prompt the user to input the values until a sentinel value of -999 is input. After the sentinel value is input, output the sum. Input the following numbers 21, -147, 77, 81, 1002, -23 and -999.

Answers

In python, your code should be:

Write a program that uses a loop with a sentinel value to find the sum of the values input. Prompt the

The Ntds. dit file is a database that stores Active Directory data, including information about user objects, groups, and group membership. It includes the password hashes for all users in the domain.
Just take the points.

Answers

Answer:

I hate it

Explanation:

Mark it as the brainliest if u love god

working with the tkinter(python) library



make the window you create always appear on top of other windows. You can do this with lift() or root.attributes('-topmost', ...), but this does not apply to full-screen windows. What can i do?

Answers

To make a tkinter window always appear on top of other windows, including full-screen windows, you must use the wm_attributes method with the topmost attribute set to True.

How can I make a tkinter window always appear on top of other windows?

By using the wm_attributes method in tkinter and setting the topmost attribute to True, you can ensure that your tkinter window stays on top of other windows, even when they are in full-screen mode.

This attribute allows you to maintain the window's visibility and prominence regardless of the current state of other windows on your screen.

Read more about python

brainly.com/question/26497128

#SPJ1

Draw the truth table for the combinational logic below.

Draw the truth table for the combinational logic below.

Answers

In this truth table, F5 is true when there are an odd number of true inputs (x, y, and z).

How to solve

The circuit for the given expression A'BC + B'CD + BC'D:

Use three AND gates:

AND1: Connect A' (A inverted), B, and C

AND2: Connect B', C, and D

AND3: Connect B, C', and D

Use an OR gate:

OR1: Connect outputs of AND1, AND2, and AND3

The output of OR1 represents the given expression: A'BC + B'CD + BC'D.

Suppose that F5 can only be true when an odd number of inputs (x, y, and z) are true in the combinational logic that produces F5. This can be demonstrated using both an XOR gate and an AND gate.

F5 = (x ⊕ y) ⊕ z

Truth table:

x | y | z | F5

--+---+---+---

0 | 0 | 0 | 0

0 | 0 | 1 | 1

0 | 1 | 0 | 1

0 | 1 | 1 | 0

1 | 0 | 0 | 1

1 | 0 | 1 | 0

1 | 1 | 0 | 0

1 | 1 | 1 | 1

In this truth table, F5 is true when there are an odd number of true inputs (x, y, and z).

Read more about truth tables here:

https://brainly.com/question/28605215

#SPJ1

You sometimes hear, “You can’t add apples and oranges.” Show that we can and do add apples and oranges in the national accounts. Explain how.

Answers

The reason for the statement of You can’t add apples and oranges.” Show that we can and do add apples and oranges in the national accounts is that the expression "apples and oranges can't be added" is used to highlight the differences between two objects that economists believe are incomparable.

What is the expression about?

Due to the lack of an acceptable unit of measurement, it is particularly challenging to measure the national income in practice. Three approaches are used in economics to measure national income:

The Product Method, also known as the Value Output Method.The Income Method.The Expenditure Method.

Which are not enough. The national income or GDP is immaterial. Therefore, Real GDP includes thousands of other items and services that cannot be directly added in economics, in addition to apples and oranges, computers, as well as power, transportation, and also education.

Learn more about national accounts from

https://brainly.com/question/1098565
#SPJ1

1.ShoppingBay is an online auction service that requires several reports. Data for each auctioned

item includes an ID number, item description, length of auction in days, and minimum required bid.

Design a flowchart or pseudocode for the following:

-a. A program that accepts data for one auctioned item. Display data for an auction only if the

minimum required bid is more than $250.00

Answers

The pseudocode for the program: Announce factors for the unloaded thing information, counting:

auction_id (numbers)

item_description (string)

auction_length (numbers)

minimum_bid (drift)

Incite the client to enter the auction_id, item_description, auction_length, and minimum_bid.

What is the pseudocode?

The program acknowledges information for one sold thing, counting the auction_id, item_description, auction_length, and minimum_bid. It at that point checks in case the minimum_bid for the unloaded thing is more prominent than or rise to to $250.00.

The pseudocode for the program pronounces factors for the sold thing information and prompts the client to enter the information. At that point it employments an in the event that articulation to check in case the minimum_bid is more noteworthy than or break even with to 250.00.

Learn more about pseudocode  from

https://brainly.com/question/24953880

#SPJ1

1.ShoppingBay is an online auction service that requires several reports. Data for each auctioneditem

A service provider recently upgraded one of the storage clusters that houses non-confidential data for clients. The storage provider wants the hard drives back in working condition. Which of the following is the BEST method for sanitizing the data given the circumstances?A. HashingB. WipingC. PurgingD. Degaussing

Answers

Answer:

C. Purging

Explanation:

Data Purging in computer storage is a process that permanently erases and remove data from a storage space.  Data deleting only removes the shortcut to the data but does not remove the data permanently, and can be easily recovered by an expert. Data purging removes data permanently and also frees up the storage or memory space for other uses. Data purging is relatively inexpensive and can be achieved with some special software tool.

Since the storage provider wants the hard drive back in working condition, data purging is the best option.

if we add 100 + 111 using a full adder, what is your output?

Answers

A digital circuit that performs addition is called a full adder. Hardware implements full adders using logic gates. Three one-bit binary values, two operands, and a carry bit are added using a complete adder. Two numbers are output by the adder: a sum and a carry bit. 100 has the binary value, 1100100.  Is your output.

What full adder calculate output?

When you add 1 and 1, something similar occurs; the outcome is always 2, but because 2 is expressed as 10 in binary, we receive a digit 0 and a carry of 1 as a result of adding 1 + 1 in binary.

Therefore, 100 has the binary value, 1100100. As we all know, we must divide any number from the decimal system by two and record the residual in order to convert it to binary.

Learn more about full adder here:

https://brainly.com/question/15865393

#SPJ1

QoS services are protocols that allow routers to make decisions about which IP datagram may be more important than others. Which IP header field would QoS details be found?

Answers

Answer:

Type of service field

Explanation:

Data messages are transmitted in packets known as IP datagram. The IP datagram consist of header (which carries the header and control field) and payload (it carries the information).

The type of service field is an eight bit field carries information about the quality of service (QoS) features. The QoS allow routers to prioritize IP datagrams like which datagram is important than other datagram.

The IP header field where the QoS details would be found is the service type field.

It should be noted that the type of service field is simply the second byte of the IPv4 header. It's simply an eight-bit length binary number field that provides an indication of the quality of service desired.

QoS services are protocols that are important for allowing routers to make decisions about the IP datagram that may be more important than others.

In conclusion, the correct option is service type field.

Read related link on:

https://brainly.com/question/17356157

Discuss the Von-Neumann CPU architecture?​

Answers

The Von Neumann architecture is a traditional CPU design named after John von Neumann and widely implemented since the mid-20th century.

What is the Von-Neumann CPU architecture?​

Basis for modern computers, including PCs, servers, and smartphones. Von Neumann architecture includes components for executing instructions and processing data. CPU is the core of Von Neumann architecture.

It manages operations, execution, and data flow in the system. Von Neumann architecture stores both program instructions and data in a single memory unit. Memory is organized linearly with each location having a unique address. Instructions and data are stored and retrieved from memory while a program runs.

Learn more about   Von-Neumann CPU architecture from

https://brainly.com/question/29590835

#SPJ1

. Write a program to calculate the square of 20 by using a loop
that adds 20 to the accumulator 20 times.

Answers

The program to calculate the square of 20 by using a loop

that adds 20 to the accumulator 20 times is given:

The Program

accumulator = 0

for _ in range(20):

   accumulator += 20

square_of_20 = accumulator

print(square_of_20)

Algorithm:

Initialize an accumulator variable to 0.

Start a loop that iterates 20 times.

Inside the loop, add 20 to the accumulator.

After the loop, the accumulator will hold the square of 20.

Output the value of the accumulator (square of 20).

Read more about algorithm here:

https://brainly.com/question/29674035

#SPJ1

Activity 2: Classify the following into Oline and Off-line Storage
1.Register is it offline or online storage

Answers

Primary storage has been refers to the RAM as it has been considered as the internal storage.

What is Secondary storage?

Secondary storage has been considered as any storage that has not the primary storage that are meant to be permanently stores data. Examples are the hard drive,as well as the tape disk drive and floppy disk drive  and the compact disk drive.

Off-line storage has been refers to any device that has use to stores data that has not been permanently attached to the computer. Examples are the flash drives and the data remains on the storage device and it can be connected to the different computer.

Therefore, Primary Storage has been a computer memory that can connects directly to the central processing unit of CPU.

Learn more about  Primary Storage on:

https://brainly.com/question/30434661

#SPJ9

Java please. Copy and paste your code and screenshot your output if you can to prove that its works. Make sure you run the program to see if the code actually works.

Java please. Copy and paste your code and screenshot your output if you can to prove that its works.
Java please. Copy and paste your code and screenshot your output if you can to prove that its works.
Java please. Copy and paste your code and screenshot your output if you can to prove that its works.

Answers

What are you talking about

The company is especially concerned about the following:

Account management. Where will accounts be created and managed?

How will user authentication be impacted? Will users still be able to use their current Active Directory credentials to sign into their devices and still access resources on the local Active Directory network?

Securing authentication in the cloud.

Address the following based on the given information:

Explain how you can implement a Microsoft Intune device management solution and still allow Tetra Shillings employees to use their existing on premises Active Directory credentials to log onto the local network.

What controls and methods are available Azure Active Directory and Intune for controlling access to resources?

What Methods are available in Intune to detect when user accounts get compromised.

What actions can be taken to prevent compromised credentials from being used to access the network.

Answers

To implement a Microsoft Intune device management solution and still allow Tetra Shillings employees to use their existing on-premises Active Directory credentials to log onto the local network, Azure AD Connect can be used. Azure AD Connect is a tool that synchronizes on-premises Active Directory with Azure AD. This allows users to use their on-premises Active Directory credentials to log into Azure AD and access resources in the cloud. Once the synchronization is set up, users can use their existing credentials to sign into their devices and access resources on the local Active Directory network.
Azure Active Directory and Intune offer various controls and methods for controlling access to resources. Azure AD provides identity and access management capabilities such as conditional access, multi-factor authentication, and role-based access control. Intune allows the administrator to enforce device compliance policies, control access to company data, and secure email and other corporate apps on mobile devices. These controls can be applied to devices enrolled in Intune, ensuring that only authorized users can access company resources.
Intune offers several methods to detect when user accounts get compromised, including:
Conditional access policies: Intune allows administrators to create conditional access policies that can detect when a user account has been compromised based on various conditions such as location, device, and sign-in risk. If a policy violation is detected, the user can be prompted for additional authentication or access can be denied.
Device compliance policies: Intune can check devices for compliance with security policies such as encryption, passcode requirements, and device health. If a device is found to be non-compliant, access can be blocked until the issue is resolved.
Microsoft Defender for Identity: This is a cloud-based service that uses machine learning to detect suspicious activity and potential threats in real-time. It can alert administrators when a user account has been compromised and provide recommendations for remediation.
To prevent compromised credentials from being used to access the network, the following actions can be taken:
Enforce strong password policies: Intune allows administrators to enforce password policies such as length, complexity, and expiration. This can prevent attackers from guessing or cracking weak passwords.
Implement multi-factor authentication: Multi-factor authentication adds an extra layer of security by requiring users to provide additional information, such as a code sent to their phone or biometric data, to verify their identity. This can prevent attackers from using stolen credentials to access resources.
Monitor and respond to security events: Azure AD and Intune provide logs and alerts for security events. Administrators should regularly monitor these events and respond promptly to any suspicious activity.
Educate users: Employees should be educated on the importance of strong passwords, phishing prevention, and other security best practices to prevent attacks on their accounts.

State two differents between website and webpage.​

Answers

Answer:

The webpage is a single document on the web using a unique URL, while a website is a collection of multiple webpages in which information on a related topic or another subject is linked together under the same domain address.

Explanation:

Why is being a meteorologist an important career?

Answers

Answer:

Most people who get into meteorology do so for the love of all things weather and climate, not for the money. Diverse skills and a willingness to seek a variety of weather and climate related jobs ensure a long, fulfilling career.

Explanation:

Weather and climate is unpredictable, so you got to learn the way the weather shifts into the unexpected, so then you'll know the state of the weather, and climate is for when your traveling around the world, you need to know the climate, and the elevation, especially if your in Colorado Mountains region and The Front Range, cuz they are a mile up. And if the weather shifts, and you don't know what weather your in, and it might be hail, and your going outside to play some basketball or whatever, and then BAM hail starts falling and hurts you. And if you don't know the climate, your practically saying you need trouble. It might be a dry climate, or a rainy climate. Meteorology is important for even traveling and weather shifts.

role of the computer for the development of a country​

Answers

Computers have a transformative impact on the development of a country by driving economic growth, revolutionizing education, fostering innovation, improving governance, and promoting connectivity.

Economic Growth: Computers play a crucial role in driving economic growth by enabling automation, streamlining processes, and increasing productivity. They facilitate efficient data management, analysis, and decision-making, leading to improved business operations and competitiveness.

Education and Skills Development: Computers have revolutionized education by providing access to vast amounts of information and resources. They enhance learning experiences through multimedia content, online courses, and virtual simulations.

Innovation and Research: Computers serve as powerful tools for innovation and research. They enable scientists, engineers, and researchers to analyze complex data, simulate experiments, and develop advanced technologies.

High-performance computing and artificial intelligence are driving breakthroughs in various fields, such as medicine, energy, and engineering.

Communication and Connectivity: Computers and the internet have revolutionized communication, enabling instant global connectivity. They facilitate real-time collaboration, information sharing, and networking opportunities. This connectivity enhances trade, international relations, and cultural exchange.

Governance and Public Services: Computers play a vital role in improving governance and public service delivery. They enable efficient data management, e-governance systems, and digital platforms for citizen engagement. Computers also support public utilities, healthcare systems, transportation, and security infrastructure.

Job Creation: The computer industry itself creates jobs, ranging from hardware manufacturing to software development and IT services. Moreover, computers have catalyzed the growth of other industries, creating employment opportunities in sectors such as e-commerce, digital marketing, and software engineering.

Empowerment and Inclusion: Computers have the potential to bridge the digital divide and empower marginalized communities. They provide access to information, educational opportunities, and economic resources, enabling socio-economic inclusion and empowerment.

For more such questions on economic growth visit:

https://brainly.com/question/30186474

#SPJ11

5. What are Excel cell references by default?
Relative references
Absolute references
Mixed references
Cell references must be assigned

Answers

Answer: relative references

Explanation:

By default, all cell references are RELATIVE REFERENCES. When copied across multiple cells, they change based on the relative position of rows and columns. For example, if you copy the formula =A1+B1 from row 1 to row 2, the formula will become =A2+B2.

To use an outline for writing a formal business document, what should you do
after entering your bottom-line statement?
O A. Move the bottom-line statement to the end of the document.
OB. Enter each major point from the outline on a separate line.
O C. Write a topic sentence for every detail.
OD. Enter each supporting detail from the outline on a separate line.

Answers

To use an outline for writing a formal business document after entering your bottom-line statement, you should: D. Enter each supporting detail from the outline on a separate line.

What is the outline?

To effectively structure the content of your business document and organize your ideas, it is beneficial to input each supporting detail outlined into individual lines. This method enables you to elaborate on every supporting aspect and furnish ample evidence to reinforce your primary assertion.

One way to enhance your document is by elaborating on each point with supporting details, supplying proof, illustrations, and interpretation as required.

Learn more about business document from

https://brainly.com/question/25534066

#SPJ1

You have implemented a network where each device provides shared files with all other devices on the network.
What type of network do you have?

Answers

You have implemented a peer-to-peer network.

What is network?

Network is a system of interconnected computers and other devices, such as smartphones, tablets, and printers, that are able to communicate and share information. Networks can be local (LAN) or wide area (WAN). A LAN is typically a smaller network used by individuals in one office or home, while a WAN is a larger network that covers a much greater area. Networks allow for the sharing of resources such as files, printers, and data, as well as the sharing of applications between multiple users. Networks also provide secure communication between users to ensure privacy and data protection.

To learn more about network
https://brainly.com/question/1326000
#SPJ4

Date:
Difference between Chemical Equivalent and Electroche-
mical equivalent.​

Answers

Answer:

chemical equivalent of an element is the value obtained by dividing the atomic weigh of the given element by valency

Which of the following is not a characteristic of a good value log entry

Answers

What are we supposed to find? Help us

can the charger of my laptop get infected with viruses also when it was connected to it?​

Answers

Answer:

Technically… yes. Because if the charging port is the same as a USB/etc connector port, then it can travel over that.

Explanation:

PLZ PLZ PLZ PLZ HELP I ONLY HAVE 5 MINUTES IT SAYS THE SUBJECT IS COMPUTERS AND TECHNOLOGY BUT ITS ACTUALLY MEDIA LIT

PLZ PLZ PLZ PLZ HELP I ONLY HAVE 5 MINUTES IT SAYS THE SUBJECT IS COMPUTERS AND TECHNOLOGY BUT ITS ACTUALLY

Answers

Answer:

B

Explanation:

I think that is the right answer

1⁰=?
Is equal to...........

Answers

Answer:

1

Explanation:

Anything to the 0th power is 1. However, 0⁰ is undefined.

Answer:

Hi! In math, anything to the zero power equals one. \(83498943^{0}\) equals one, and \(2^{0}\) equals one.

Hope this helps!

In this week's lecture, you learned that PowerPoint allows you a great deal of creativity when it comes to developing your presentation. With that in mind, in this week's discussion, we will be investigating more of what PowerPoint offers users as far as creativity goes. Please go to the link below:

Templates for PowerPoint

In your initial post, highlight at least two PowerPoint templates. You will download the templates from the website and attach the blank PowerPoint files to your post. You will address the following prompts as you write your post:

Explain how each template you chose could be used in a specific professional setting. Be detailed.
Describe, in detail, how these templates provide a presenter an advantage that a basic slide design (or no design at all) could not.
Address the potential danger in focusing too much on templates and slide designs. Can a user go too far?

Answers

The template you chose could be used in a specific professional setting.

Form templates can be used in making course forms, school forms and others.Content builder element templates can be used in business presentation, marketing and others.

How these templates provide a presenter an advantage

Templates is known to be one that makes the creation of documents to be simply and very easy.

A form template is known to be a kind of a single file that is made up of a lot of supporting files, such as files that tells a person how controls on the form template should look like and others.

A content builder template is one that can make you to be specific in terms of your content and buttress on key points in regards to what you are presenting.

What are the potential danger in focusing too much on templates and slide designs?

The dangers are;

Wordiness.A case of information overload for the target audience. Unable to capture the audience attention.Too much information can overwhelm the target audience and also distract them from getting the message that is been passed. Can a user go too far?

Yes they can.

Note that Templates can relief human workload and make us to have little stressed, and, also at the same time, they help to boast efficiency. Templates brings up the attention of the audience as well as saves time and money.

Hence, The template you chose could be used in a specific professional setting.

Form templates.Content builder element templates.

Learn more about template from

https://brainly.com/question/27326303

#SPJ1

In this week's lecture, you learned that PowerPoint allows you a great deal of creativity when it comes
In this week's lecture, you learned that PowerPoint allows you a great deal of creativity when it comes

website is a collection of (a)audio files(b) image files (c) video files (d)HTML files​

Answers

Website is a collection of (b) image files (c) video files and  (d)HTML files​

What is website

Many websites feature a variety of pictures to improve aesthetic appeal and provide visual substance. The formats available for these image files may include JPEG, PNG, GIF, or SVG.

To enhance user engagement, websites can also introduce video content in their files. Web pages have the capability to display video files either by embedding them or by providing links, thereby enabling viewers to watch videos without leaving the site. Various formats such as MP4, AVI and WebM can be utilized for video files.

Learn more about  website  from

https://brainly.com/question/28431103

#SPJ1

list down four ways to start word 2010​

Answers

1Locate the Word icon on the Start button's All Programs menu. Don't click to start Word now!
2Right-click the Microsoft Word 2010 menu item. A pop-up menu appears.
3Choose Send To→Desktop (Create Shortcut).
4Press the Esc key to hide the Start button menu and view the desktop.

In Java Please

4.24 LAB: Print string in reverse
Write a program that takes in a line of text as input, and outputs that line of text in reverse. The program repeats, ending when the user enters "Done", "done", or "d" for the line of text.

Ex: If the input is:

Hello there
Hey
done
the output is:

ereht olleH
yeH

Answers

The program that takes in a line of text as input, and outputs that line of text in reverse is given

The Program

import java.util.Scanner;

public class ReverseString {

  public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       String line;

       do {

           line = input.nextLine();

           if (!line.equalsIgnoreCase("done") && !line.equalsIgnoreCase("d")) {

               String reversed = reverseString(line);

              System.out.println(reversed);

           }

       } while (!line.equalsIgnoreCase("done") && !line.equalsIgnoreCase("d"));

   }

  public static String reverseString(String text) {

       StringBuilder reversedText = new StringBuilder();

       for (int i = text.length() - 1; i >= 0; i--) {

           reversedText.append(text.charAt(i));

       }

       return reversedText.toString();

   }

}


Read more about programs here:

https://brainly.com/question/30783869

#SPJ1

Explain the steps that are needed to remove the data items from linked list

Answers

Explanation:

Iterative Method:

To delete a node from the linked list, we need to do the following steps.

1) Find the previous node of the node to be deleted.

2) Change the next of the previous node.

3) Free memory for the node to be deleted.

Other Questions
Refer to exhibit 4-5. if a free market were allowed in the transplanted kidney market, then the equilibrium price would be p2. the number of kidneys transplanted would increase by _________ compared to the number transplanted at a price ceiling of p= $0. (q3 - q2) q2 (q2 - q1) (q3 - q1) What is the ratio of the orbital velocity of two satellites each in circular orbit around earth given that satellite a orbits 8.60 times as far from earths center of gravity as satellite Give your answer in terms of b's velocity to A's velocity || what does that symbol means in geometry I need the answer for Number six WILL MARK BRAINLIEST Read each title carefully, then select a likely purpose for reading that text. Beloved, a novel by Toni Morrison: Hole in My Life, a memoir by Jack Gantos: Team of Rivals: The Political Genius of Abraham Lincoln, a history by Doris Kearns Goodwin: Herb Gardening for Beginners: How to Grow Fresh Herbs at Home, Including over 50 Varieties, Recipes and Crafts, a guide by Janet Williams: How do I write -2 3/4 as a decimal number? Answer the following questionsi. Identify the structure labelled A in the diagram. ii. Identify the structure labelled B in the diagram. iii. What do mosses and liverworts have in common iv. Define a protonema Please help Ill give brainliest The lengths of pregnancies in a small rural village are normally distributed with a mean of 269 days and a standard deviation of 12 days.In what range would we expect to find the middle 95% of most lengths of pregnancies? Round the answer to one decimal place.Between(....)and(....) days Why is Key Club important to you? Can somebody help me on this please? what are the tables of values for 2cos(3Theta)? Pls help it is due today How did the Ku Klux Klan begin?as a political party running for officeas a social group of former Confederatesas an outlaw group of banditsas a government-sponsored group to aid former Confederates. (X-2)^2 - (x-4)^2 simplify What dating technique could scientist use to find the age of a meteoroid? the door handles are kept near the door handles A male gorilla weighs 379 pounds on average. This is181 pounds more than the weight of the average femalegorilla. Write and solve an addition equation to find theweight of an average female gorilla. Doug hasnt returned yet, but he called a few minutes ago.A: comma spliceB: fragmentC: run-onD: correct sentence Complete the paragraph with the correct translational words