Answer:
Follows are the program code to this question:
def check():#defining a method check
while(True):#defining a while loop that uses for the input value
x=input("Enter value to check valid or not: ")#print message
if x=='':#use if block that check input is null
break#use break keyword for exit
else:#defining else block
try:#use try block
x=float(x)#use x vaiable to convert value into float
print("valid number")#print message
except:#use except block
print("not valid number")#print message
continue#use continue keyword
check()#call ing method
Output:
please find the attachment.
Explanation:
In the above-given program, a method "check" is defined, and inside the method, a while loop is used to input the value in the "x" variable.
In the next step, a conditional statement is used in the if block, it checks if x value is equal to null it will use break keyword to exit the program.
In the else block x variable is used, that converts the integer value into float and uses the try and except for check the given value and print the message respectively.
HURRY PLEASE
Maria is creating a game that will need a random number. Which line of code should be included in this program?
import random
print(random number)
1num = random
create random
Answer:
import random
Explanation:
Using the random module in python you could generate a random number.
Answer: Import
Explanation:
The internet allows you quick access to research and digital media what do you need to do if you want to use someone’s else’s work?
Answer:
You need to cite someone else's work
Explanation:
Use the drop-down menus to complete statements about archiving and backing up data fileArchiving data files manages the size of a mailbox for storage.
Creating an Outlook data file
data files in storage on a computer.
Answer:
Archiving data files manages the size of a mailbox for
✔ local
storage.
Creating an Outlook data file
✔ protects
data files in storage on a computer.
Explanation:
Because its right.
Answer:
an increase in cloud computing
Explanation:
The Ntds. dit file is a database that stores Active Directory data, including information about user objects, groups, and group membership. It includes the password hashes for all users in the domain.
Just take the points.
Answer:
I hate it
Explanation:
Mark it as the brainliest if u love god
What is the function of a breadcrumb trail in a website?
Answer: traces between homepage and current web page
Explanation:
In which column(s) might replication have been used
Answer:
Explanation:
wdym?
Mark me brainliest
Introduction to Programming Workbook
Draw flowchart to find the largest among threu different numbers entered by a user
in Python
# Create a function called get_total. The function should have 2 parameters : price and count
# if either parameter value is negative return 0
# otherwise return total which is calculated as price * count
# call the function with the values 3 and 8
# print the returned result. (NOT in the function)
# call the function again with the values -5 and 4
# print the returned result. (NOT in the function)
Note that the Phyton function that executes the above-described tasks is given as follows:
def get_total(price, count):
if price < 0 or count < 0:
return 0
else:
return price * count
# Call the function with the values 3 and 8
result1 = get_total(3, 8)
print(result1)
# Call the function again with the values -5 and 4
result2 = get_total(-5, 4)
print(result2)
In the first function call, the values of price and count are both positive, so the function returns their product, which is 24.
In the second function call, the value of price is negative, so the function returns 0.
Note that the output wil be
24
0
Learn more about Phyton:
https://brainly.com/question/19070317
#SPJ1
What is the condition for setting an alarm clock
Answer:
The time in which the alarm clock will sound
Explanation: Hope this helped please give me brainliest
50 POINTS please helpppppp What does SET used to secure emails? S/MIME stand for secure/multipurpose Internet extensions it is a standard for public key encryption. this standard uses a digital _______ to secure emails
Answer:
signature!
Explanation:
hope this helped
Answer:
Answer Is Signature
Explanation:
Using examples, evaluate the open source model of software development. In your discussion highlight some of its advantages and disadvantages. Furthermore, explain some of the alternatives that also exist.
Students who respond promptly to e-mails are following which netiquette rule?
A. keeping content appropriate
B. assessing an online environment
C. respecting everyone’s time
D. practicing ethical behaviors
Answer:
respecting everyone's time
Explanation:
they don't make people wait for a response
Declare a 4 x 5 list called N.
Using for loops, build a 2D list that is 4 x 5. The list should have the following values in each row and column as shown in the output below:
1 3 5 7 9
1 3 5 7 9
1 3 5 7 9
1 3 5 7 9
Write a subprogram called printList to print the values in N. This subprogram should take one parameter, a list, and print the values in the format shown in the output above.
Call the subprogram to print the current values in the list (pass the list N in the function call).
Use another set of for loops to replace the current values in list N so that they reflect the new output below. Call the subprogram again to print the current values in the list, again passing the list in the function call.
1 1 1 1 1
3 3 3 3 3
5 5 5 5 5
7 7 7 7 7
Answer:
# Define the list N
N = [[0 for j in range(5)] for i in range(4)]
# Populate the list with the initial values
for i in range(4):
for j in range(5):
N[i][j] = 2*j + 1
# Define the subprogram to print the list
def printList(lst):
for i in range(len(lst)):
for j in range(len(lst[i])):
print(lst[i][j], end=' ')
print()
# Print the initial values of the list
printList(N)
Output
1 3 5 7 9
1 3 5 7 9
1 3 5 7 9
1 3 5 7 9
--------------------------------------------------------------------
# Update the values of the list
for i in range(4):
for j in range(5):
N[i][j] = 2*i + 1
# Print the new values of the list
printList(N)
Output
1 1 1 1 1
3 3 3 3 3
5 5 5 5 5
7 7 7 7 7
Explanation:
Fill in the blanks: The _____ is useful for predicting future results. A. mean. B.median. C.mode
Answer:
Mean
Explanation:
What are recommended CPUs?
INTEL:
It does vary depending on your PC use, however, for office work, the i5 8th Gen is a recommended CPU as it can handle the requirements for office use without stress. For Gaming and high-end use, the i9 is a recommended CPU as it can handle games easily without stress.
AMD:
AMD Ryzen 3 3300X is good for office work and can handle office scenarios and the AMD Ryzen 7 3800x is good for gaming and high-end use.
Hope this helps,
Azumayay
C++ 3.4.4: If-else statement: Print senior citizen. Write an if-else statement that checks patronAge. If 55 or greater, print "Senior citizen", otherwise print "Not senior citizen" (without quotes). End with newline.
Answer:
#include <iostream>
using namespace std;
int main()
{
int patronAge = 71;
if(patronAge >=55)
cout<<"Senior citizen"<<endl;
else
cout<<"Not senior citizen"<<endl;
return 0;
}
Explanation:
Initialize the patronAge age, in this case set it to 71
Check the patronAge. If it is greater than or equal to print "Senior citizen". Otherwise, print "Not senior citizen". Use "endl" at the end of each print statement to have new lines.
1.) Explain one way the internet has impacted the way we behave.
2.) Explain one way the internet has impacted the way we think.
What type of 3-phase connection requires only two transformers?
The use of two single-phase transformers to step down a high 3-phase voltage to a lower 3-phase voltage is possible using a rudimentary configuration dubbed an "open delta."
What is a single-phase transformer?For industrial applications, three phase transformers perform significantly better. Most heating, air conditioning, lighting, and house applications employ single phase systems in residential settings. When compared to low-power industrial systems and machines, they are less productive. A specific type of transformer called a single phase transformer functions using only one phase of power. This device carries electrical power from one circuit to another by the mechanism of electromagnetic induction. It is a passive electrical device. A transformer cannot change single-phase electricity into three-phase power, even if single-phase power can be produced from a three-phase power source. Phase converters or variable frequency drives are needed to convert single-phase electricity to three-phase power.To learn more about single phase transformers, refer to:
https://brainly.com/question/29665451
HELP ASAP PLZ PLZ PLZTegan is playing a computer game on her smartphone and the battery is getting low. When she goes to charge her phone, she notices that the cord is broken. What can Tegan do to solve her problem?
Plug in the smartphone to charge.
Put tape around the broken part of the cord.
Ask a trusted adult for help replacing the cord.
Use the laptop charger instead.
Answer:
3rd choice
Explanation:
Which Azure networking component is the core unit, from which administrators can have full control over IP address assignments, name resolution, security settings and routing rules
Answer:
The correct answer will be "Virtual networks".
Explanation:
This networking seems to be the major element of azure connectivity that further keep track of almost all of the essential administrative responsibilities. Its function involves complete ownership over all the appointments of Ip addresses as well as the settlement of names.This decides based on the criteria for transferring the information from one place to another other.What is number of maximum number of virtual processors for each of the
following Hyper-V client?
Answer by a number such as 16.
1. Windows 7
2. Windows 8
3. Open SUSE 12.1
The number of maximum number of virtual processors for each of the
following Hyper-V client are:
Windows 7 - 4 virtual processorsWindows 8 - 32 virtual processorsOpen SUSE 12.1 - 64 virtual processorsWhat is the virtual processors?Hyper-V is a hypervisor-located virtualization platform that allows diversified virtual machines to gossip a single physical apparatus. One of the key advantages of virtualization is the skill to allocate virtual processors for each virtual system, which allows the computer software for basic operation running inside the virtual tool.
The maximum number of in essence processors that can be filling a place a virtual machine depends on various factors, containing the capabilities of the physical main part of computer and the version of the computer software for basic operation running inside the virtual machine.
Learn more about virtual processors from
https://brainly.com/question/30628655
#SPJ1
The internet solves a variety of problems. How does it solve the problem of data storage?
Responses
Even if your device is damaged, with the cloud, your information is still available online.
It allows people to store all their data safely on physical devices such as memory sticks.
It allows people to store all their data safely on physical devices such as memory sticks.
It allows people to work from home and always keep all their data with them on their devices.
With the cloud, even if the internet is not working, your information is still available on a device.
Answer:
i would say B
Explanation:
it makes the most sense
Write a java program that accepts the ingredients for a recipe in cups and converts to ounces
Answer:
Explanation:
public static int cupsToOunces (int cups) {
int ounces = cups * 8;
return ounces;
}
This is a very simple Java method that takes in the number of cups in the recipe as a parameter, converts it to ounces, and then returns the number of ounces. It is very simple since 1 cup is equal to 8 ounces, therefore it simply takes the cups and multiplies it by 8 and saves that value in an int variable called ounces.
TWO (2) negative effects of how technology use in education affects students' learning. Your response should include a minimum of FIVE (5) credible sources.
Technological advancements have taken education to new heights, yet they have come with their fair share of drawbacks.
What is the explanation for the above response?Two such demerits of utilising technology in classrooms are distraction and lack of retention capacity among students.
Given the myriad choices provided by tech in terms of entertainment such as social networking sites or online games, students tend to lose focus and face negative consequences such as poor academic performance.
Technology dependency poses a vulnerability that can hinder student learning outcomes.
Students whose reliance rests solely on technology may face challenges related to critical thinking and problem-solving abilities - two necessary skills for achieving academic success.
Learn more about technology at:
https://brainly.com/question/28288301
#SPJ1
HELP NOW PLS now now now
Answer:
6.enable data to pass between computers in a network to aid communication between users. As a network engineer, you'll have responsibility for setting up, developing and maintaining computer networks within an organisation or between organisations.
7.Sony
At times, what seems to be an effective value network can also be vulnerable to quickly losing effectiveness. At one time, Sony Corporation set up a value network designed to have a "one-stop" gaming experience for its customers. From 2003 to 2008, Sony designed an all-encompassing gaming portal. However, the network was disrupted when computer hackers began breaking into the system and retrieving sensitive banking data from the network users. As a result, the effectiveness of the network was severely compromised.
Explanation:
which statements describes the size of an atom
answer:
A statement that I always think about to understand the size of an atom. If you squish a person down to the size of an atom. It will make a black hole. and if you squish the whole Earth. down to the size of a jelly bean it will also make a black hole. This is just a approximation.
-----------------------
I use the scale to understand how small that is I am open to hear more principles if you were talking about math wise that would be glad to help.
if you have anymore questions I will try to answer your questions to what I know.
.
When the InfoSec management team’s goals and objectives differ from those of the IT and general management communities, what items should be considered for the resolution, and who should be involved and provide an example of a situation where such a conflict might exist
phone holder 2 questions
What type of file is MyFile.bat?
executable file
batch file
data file
helper file
Answer:
the correct answer is batch file
Answer:
This is considered a batch file
Explanation:
.bat
In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.
Answer: Excel Average functions
Explanation: it gets the work done.
Answer:
excel average
Explanation:
The previous Discussions have provided the opportunity to share some elegant solutions to programming challenges, and many of them share one common trait—they all handle multiple objects with ease. Forget, for the moment, about some of the complexity involved. The formulas may seem strange, but do not worry. At this stage of programming, you are not expected to generate such things on your own; very few new programmers can. Instead, stop to consider the ways programs embrace the computer’s true assets.
Machines do not mind doing the same thing over and over again; they never get bored. They are also capable of handling massive amounts of data in an impeccably organized manner. One of your challenges as a programmer is to communicate, through code, in an efficient way that plays to the computer’s strengths.
Consider, for example, having to write a program to manage personnel records for all of the people working for your company. You certainly would not want to have to write a program with a unique variable for each unique person in the company. Every time a new employee was hired, someone would have to modify the program to add a new variable for that employee. Every time an employee left the company, someone would have to modify the program to remove that employee’s variable and data from the program. Clearly, this would be a very tedious way to automate personnel records. Instead, you need a way to manage that collection of personnel information in a more organized manner. In fact, you need a way of representing the collection of individual employees as just that, a single variable that provides access to all of the employees. Then, you can use loops to process the employee data. Fortunately, Java provides the concept of an array (and other similar collections, such as the ArrayList) to manage collections of similar objects.
It takes time to truly grasp how powerful object-oriented programming can be and how you can harness its "objects-first" focus to make your own programs concise and elegant. Unfortunately, some programmers do not invest that time. They rely on brute force—repetitive methods resulting in long programs that are, by nature, hard to review and debug.
Return to the open source repositories you previously explored. Find a program that (A) uses at least one loop and a list effectively or (B) could use a loop and a list to improve the program.
*. Response that summarizes your findings. The post should:
1. Include a copy of the code that either (A) exemplifies concise, generalized code or (B) presents the perfect opportunity to apply loops, arrays, and lists to reduce the length of the program using a more elegant solution. Do not undertake a lengthy program; limit your code to approximately 20 lines.
2. If the code is an exemplar of good coding, explain what leads you to that conclusion. Be specific.
3. If the code needs improvement, include a rewritten version of the code, in which you apply one of the methods described above to improve the program. Explain how your solution better embraces a computer’s strengths as a tool that can perform calculations quickly, perform repetitive tasks, and/or manage data effectively.
4. Add or revise comments in the code to accurately describe the function of the loop and list.
Do not include the entire source code of the program you choose. Select just the portion with the necessary information, such as variable declarations and methods called from outside the class or method.
Answer:
I can't make out the question