I need help with my work

I Need Help With My Work

Answers

Answer 1

Answer:

totally

awesome

Explanation:

You can evaluate the expressions in the statements by hand:

if (a*b!=c) evaluates to

if (2*3 != 11)

if (6 != 11)

if (true)

so the next line is executed (it prints 'totally')

Likewise, the other if statement also evaluates to true.


Related Questions

From your analysis, do you think you’ve seen all of the servers and hosts that make up the Amazon e-commerce site? How does Amazon’s architecture affect the security of the site? Consider the hosts you’ve seen that might be private or public facing.

Answers

Answer:confused

Explanation:

Credible sites contain___________information,
a.
Accurate
c.
Reliable
b.
Familiar
d.
All of the above


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer:

C:  Reliable

Explanation:

Credible sites are not always accurate. Credible sites are sites you trust and usually have a resume of being correct.

For example, if you like a news website that you trust and are usually correct, you could say that's a Reliable source.

Credible sites contain "accurate, reliable and familiar" information. this makes the correct answer D: All of the above.

What are Credible sites contain?

A Credible sites includes the date of any information, cite the source of the information presented, are well designed and professional.

Some example of credible site are; the site of an university , while a non-credible site is a site that wants to sell you something by sending you repeated email.

A Credible sites are not always accurate

Also, Credible sites are sites you trust and usually have a resume of being correct.

Hence Credible sites contain "accurate, reliable and familiar" information. this makes the correct answer D: All of the above.

Learn more about the similar question;

https://brainly.com/question/3235225

#SPJ2

What is one reason that many older PC games, when run on modern hardware, will run at high speeds? Include discussions of frame rates and refresh rates in your answer and how toggling these settings might fix the problem (for example, by turning on V-sync in a game’s settings).

Answers

Answer:

Yes, mainly due to the changes in Windows operating system, hardware, and/or drivers. For example, I own old games that only runs on the defunct 3dfx graphic chipsets. Despite Nvidia acquiring them, they didn't embed any 3dfx code. So running those games today would require you to use a 3dfx Glide wrapper since no card today can run that natively.  Explanation:

CCFL (cold cathode fluorescent lamps) back-light is the light technology that is used in the displays of the devices like LCD TV, LCD monitor etc. This technology was used earlier in the display device units.

Why LCD monitor flickering?

LCD monitor flickering or fluctuation can occur due to the disturbance or damage in the CCFL back-light resulting in the failure. Other options are incorrect because refreshing option is not concerned with the display light. LED light is not used the mentioned monitor.

A DDR4 ram module with that kind of rating would be running at a speed of 2133 megahertz. The pc4-17000 basically means that the particular ddr4 module has a bandwidth of 17000 megabytes per second.

The computer's resolution has been set too low as when the screen of a system looks distorted and the desktop icons do not appear properly, it's a sign of low screen resolution. This is often caused by the lack of proper display driver.

Therefore, CCFL (cold cathode fluorescent lamps) back-light is the light technology that is used in the displays of the devices like LCD TV, LCD monitor etc. This technology was used earlier in the display device units.

Learn more about technology on:

https://brainly.com/question/9171028

#SPJ2

write principles of information technology

Answers

Here are some principles of information technology:

Data is a valuable resourceSecurity and privacy

Other principles of information technology

Data is a valuable resource: In information technology, data is considered a valuable resource that must be collected, stored, processed, and analyzed effectively to generate useful insights and support decision-making.

Security and privacy: Ensuring the security and privacy of data is essential in information technology. This includes protecting data from unauthorized access, theft, and manipulation.

Efficiency: Information technology is all about making processes more efficient. This includes automating tasks, reducing redundancy, and minimizing errors.

Interoperability: The ability for different systems to communicate and work together is essential in information technology. Interoperability ensures that data can be shared and used effectively between different systems.

Usability: Information technology systems should be designed with usability in mind. This means that they should be intuitive, easy to use, and accessible to all users.

Scalability: Information technology systems must be able to grow and expand to meet the changing needs of an organization. This includes the ability to handle larger amounts of data, more users, and increased functionality.

Innovation: Information technology is constantly evolving, and new technologies and solutions are emerging all the time. Keeping up with these changes and being open to innovation is essential in information technology.

Sustainability: Information technology has an impact on the environment, and sustainability must be considered when designing and implementing IT systems. This includes reducing energy consumption, minimizing waste, and using environmentally friendly materials.

Learn more about information technology at

https://brainly.com/question/4903788

#SPJ!

In 2019, the tuition for a full time student is $7,180 per semester. The tuition will be going up for the next 7 years at a rate of 3.5% per year. Write your program using a loop that displays the projected semester tuition for the next 7 years. You may NOT hard code each years tuition into your program. Your program should calculate the tuition for each year given the starting tuition in 2019 ($7, 180) and the rate of increase (3.5%). You should then display the actual year (2020, 2021, through 2026) and the tuition amount per semester for that year

Answers

Answer:

In Python:

tuition = 7180

year = 2019

rate = 0.035

for i in range(2019,2027):

   print(str(year)+": "+str(round(tuition,2)))

   tuition = tuition * (1 + rate)

   year = year + 1

   

Explanation:

This initializes the tuition to 7180

tuition = 7180

This initializes the year to 2019

year = 2019

This initializes the rate to 3.5%

rate = 0.035

This iterates through years 2019 to 2026

for i in range(2019,2027):

This prints the year and tuition

   print(str(year)+": "+str(round(tuition,2)))

This calculates the tuition

   tuition = tuition * (1 + rate)

This increments year by 1

   year = year + 1

because many of the older supply chain management professionals are retiring and because supply chain management increasingly involves the use of innovative technologies:

Answers

Forecasting in supply chain management is the process of estimating demand, supply, and pricing within an industry. To forecast the future of an industry, it is necessary to research the competitors, gather supplier information, and examine historical trends.

A supply chain management must have the ability to forecast, which involves many other talents that one should develop as they advance in their careers.

1. Planning Methods

Forecasting significantly enhances the scheduling and planning process. A supply chain can stay competitive by paying attention to the past and present demand for its products.

2. Demand Variations Seasonally

Being able to anticipate and prepare for seasonal fluctuations is one of the numerous factors that supply chain management needs forecasts for.

Learn more about supply chain here:

https://brainly.com/question/29318233

#SPJ4

What happens after the POST?

Answers

After the POST, the computer is ready for user interaction. Users can launch applications, access files, browse the internet, and perform various tasks depending on the capabilities of the operating system and the installed software.

After the POST (Power-On Self-Test) is completed during a computer's startup process, several important events take place to initialize the system and prepare it for operation. Here are some key steps that occur after the POST:

1. Bootloader Execution: The computer's BIOS (Basic Input/Output System) hands over control to the bootloader. The bootloader's primary task is to locate the operating system's kernel and initiate its loading.

2. Operating System Initialization: Once the bootloader locates the kernel, it loads it into memory. The kernel is the core component of the operating system and is responsible for managing hardware resources and providing essential services.

The kernel initializes drivers, sets up memory management, and starts essential system processes.

3. Device Detection and Configuration: The operating system identifies connected hardware devices, such as hard drives, graphics cards, and peripherals.

It loads the necessary device drivers to enable communication and proper functioning of these devices.

4. User Login: If the system is set up for user authentication, the operating system prompts the user to log in. This step ensures that only authorized individuals can access the system.

5. Graphical User Interface (GUI) Initialization: The operating system launches the GUI environment if one is available. This includes loading the necessary components for desktop icons, taskbars, and other graphical elements.

6. Background Processes and Services: The operating system starts various background processes and services that are essential for system stability and functionality.

These processes handle tasks such as network connectivity, system updates, and security.

For more such questions on POST,click on

https://brainly.com/question/30505572

#SPJ8

HELP ASAP PLZZZZZ

Question 35(Multiple Choice Worth 5 points)

(03.01 LC)


To write a letter to your grandma using Word Online, which document layout should you choose?


APA Style Paper

General Notes

New Blank Document

Table of Contents

Answers

Answer:

third one

Explanation:

To write a letter to your grandma using Word Online, you should choose the "New Blank Document" layout.

What is Word?

Microsoft Word is a word processing application. It is part of the Microsoft Office productivity software suite, along with Excel, PowerPoint, Access, and Outlook.

To write a letter to your grandmother in Word Online, select the "New Blank Document" layout. This will open a blank page on which you can begin typing your letter.

The "APA Style Paper" layout is intended for academic papers and includes formatting guidelines and section headings that a personal letter may not require.

In Word Online, "General Notes" is not a document layout option.

The "Table of Contents" feature generates a table of contents based on the headings in your document, but it is not a document layout option.

Thus, the answer is "New Blank Document".

For more details regarding Microsoft word, visit:

https://brainly.com/question/26695071

#SPJ2

In designing a database, a database administrator should consider..

Select one or more:

a. who can access which data
b. what data to be be collected
c. where to place the server of the database
d. business rules and logic
e, how data should be organized

Answers

Answer:

her answer is write dear

A company has recently learned of a person trying to obtain personal information of employees illegally. According to which act will be the person punished?

I-SPY
CFAA
Digital Millennium Act
SOPA

Answers

Answer:

Digital Millennium Act

Explanation:

The Digital Millennium Copyright Act  is a United States copyright law that implements two  treaties of the World Intellectual Property Organization . The aim of this ACT is to protect the rights of both copyright owners and consumers. The law complies with the World Intellectual Property Organization  Copyright. The law has two basic functions. First, it protects copyright owners by providing them with a mechanism to enforce their rights without having to directly sue the infringer

Hope that helped.

The parameter string on the URL comes after the path.
True
False

Answers

Answer:

True

Explanation:

LOLOLOLOLOLOLOLO

The parameter string on the URL comes after the path is correct statement. Therefore, the statement is true.

What is URL?

The full form of URL is Uniform Resource locator, which refers to the address of the web pages and have the unique address to help the users to locate the webpages on the internet and collect the relevant information.

The Parameter in a URL refers to pass click-related information and keep the track of the information of the every click by incorporating URL parameters. An equals sign (=) is used to divide a key from a value in URL parameters, and an ampersand is used to unite them.

Some URLs feature a group of characters beginning with a question mark after the path.

Therefore, it can be concluded that after the path comes the parameter string on the URL. Hence, The above statement is true.

Learn more about URL here:

https://brainly.com/question/10065424

#SPJ2

(Language is in Java)

Write an interactive version of the InchesToFeet class that accepts the inches value from a user.



class InchesToFeetInteractive
{
public static void main(String[] args) {
// Modify the code below
final int INCHES_IN_FOOT = 12;
int inches = 86;
int feet;
int inchesLeft;
feet = inches / INCHES_IN_FOOT;
inchesLeft = inches % INCHES_IN_FOOT;
System.out.println(inches + " inches is " +
feet + " feet and " + inchesLeft + " inches");
}
}​

Answers

import java.util.Scanner;

public class InchesToFeetInteractive

{

public static void main(String[] args) {

   Scanner scan = new Scanner(System.in);

   final int INCHES_IN_FOOT = 12;

   int inches = scan.nextInt();

   int feet;

   int inchesLeft;

   feet = inches / INCHES_IN_FOOT;

   inchesLeft = inches % INCHES_IN_FOOT;

   System.out.println(inches + " inches is " +

   feet + " feet and " + inchesLeft + " inches");

   }

}

We import the Scanner class and then initialize a new Scanner named scan. We then get an integer representation of inches from the user and calculate the feet and inches from the value entered by the user.

Describe why some people prefer an AMD processor over an Intel processor and vice versa.

Answers

Answer: AMD’s Ryzen 3000 series of desktop CPUs are very competitive against Intel’s desktop line up offering more cores (16 core/32 thread for AMD and 8 core/16 thread for Intel) but with a lower power draw - Intel may have a lower TDP on paper but my 12 core/24 thread 3900x tops out at around 140W while a i9 9900K can easily hit 160W-180W at stock settings despite having a 10W lower TDP.

Drag each tile to the correct box.
Match the job title to its primary function.
computer system engineer
online help desk technician
document management specialist
design and implement systems for data storage
data scientist
analyze unstructured, complex information to find patterns
implement solutions for high-level technology issues
provide remote support to users

Answers

The correct match for each job title to its primary function:

Computer System Engineer: Design and implement systems for data storage.

Online Help Desk Technician: Provide remote support to users.

Document Management Specialist: Implement solutions for high-level technology issues.

Data Scientist: Analyze unstructured, complex information to find patterns.

Who is a System Engineer?

The key responsibility of a computer system engineer is to develop and execute data storage systems. Their main concentration is on developing dependable and effective storage options that fulfill the company's requirements.

The primary duty of an online help desk specialist is to offer remote assistance to users, addressing their technical concerns and resolving troubleshooting queries.

The main responsibility of a specialist in document management is to introduce effective measures to address intricate technological matters pertaining to document security, organization, and retrieval.

Read more about data scientists here:

https://brainly.com/question/13104055

#SPJ1

With suitable example, illustrate the use of #ifdef and #ifndef.

Answers

Partitions are used to divide storage spaces into manageable segments.

Fixed partitions have a predetermined size, and they are used to allocate storage space based on the needs of an application. Fixed partitions are commonly used in mainframe systems, where applications require predictable amounts of storage.

For example, consider an organization that uses a mainframe system to manage its payroll. In this scenario, the organization may use fixed partitions to allocate storage space to the payroll application, ensuring that it has access to a specific amount of storage space at all times.

On the other hand, dynamic partitions allow the operating system to allocate storage space based on the requirements of an application. With dynamic partitions, the size of the partition is not fixed, and it can grow or shrink based on the needs of an application.

For example, consider a personal computer that is used to store and manage different types of data. In this scenario, dynamic partitions are used to allocate storage space to different applications based on their storage requirements.

As new applications are installed, the operating system dynamically allocates storage space to ensure that each application has sufficient storage space to function properly.

To know more about Partitions visit:

brainly.com/question/31672497

#SPJ1

Question 11 of 20
Samantha wants to show the steps in a process. What type of graphic should
she use?
A. Bar chart
B. Flow chart
C. Pie chart
D. Organization chart
SUBMIT

Answers

Answer:

Organization Chart

Explanation:

So it can show what to do and when to do it

Answer:

Hi, thank you for posting your question here at Brainly.

Let's characterize each chart first.

Flow chart - chart that displays a flow process through shapes like diamonds and boxes connected by arrows

Pie chart - chart that displays distribution of parts from a whole

Bar chart - this chart presents grouped data through rectangle blocks

Organizational chart - this chart shows the hierarchy of an organization and their relations

the answer must be flow chart. The answer is letter B.

Difference between Python vs Pandas?

Answers

Python and Pandas are not directly comparable as they serve different purposes. Here's an explanation of each:

Python:

Python is a general-purpose programming language known for its simplicity and readability. It provides a wide range of functionalities and can be used for various tasks, including web development, data analysis, machine learning, and more. Python has a large standard library and an active community, making it versatile and widely used in different domains.

Pandas:

Pandas, on the other hand, is a powerful open-source library built on top of Python. It is specifically designed for data manipulation and analysis. Pandas provides easy-to-use data structures, such as Series (one-dimensional labeled arrays) and DataFrame (two-dimensional labeled data tables), along with a variety of functions for data cleaning, transformation, filtering, grouping, and aggregation.

In essence, Python is the programming language itself, while Pandas is a Python library that extends its capabilities for data analysis and manipulation. You can use Python to write code for a wide range of purposes, while Pandas is focused on providing efficient and convenient tools for working with structured data.

for similar questions on Python.

https://brainly.com/question/26497128

#SPJ8

following the 2012 olympic games hosted in london. the uk trade and envestment department reported a 9.9 billion boost to the economy .although it is expensive to host the olympics,if done right ,they can provide real jobs and economic growth. this city should consider placing a big to host the olympics. expository writing ,descriptive writing, or persuasive writing or narrative writing

Answers

The given passage suggests a persuasive writing style.

What is persuasive Writing?

Persuasive writing is a form of writing that aims to convince or persuade the reader to adopt a particular viewpoint or take a specific action.

The given text aims to persuade the reader that the city being referred to should consider placing a bid to host the Olympics.

It presents a positive example of the economic benefits brought by the 2012 Olympic Games in London and emphasizes the potential for job creation and economic growth.

The overall tone and content of the text are geared towards convincing the reader to support the idea of hosting the Olympics.

Learn more about persuasive writing :

https://brainly.com/question/25726765

#SPJ1


Full Question:

Following the 2012 Olympic Games hosted in London, the UK Trade and Investment Department reported a 9.9 billion boost to the economy. Although it is expensive to host the Olympics, if done right, they can provide real jobs and economic growth. This city should consider placing a bid to host the Olympics.

What kind of writing style is used here?

A)  expository writing

B) descriptive writing

C)  persuasive writing

D)  narrative writing

what is output? x=-2 y=-3 print (x*y+2)

Answers

Answer:

=8

Aaaaaaaaaansjxjdjsaaaaaaa

Explanation:

-2*-3=6+2=8

HELP PLS
Which technologies have made global communication instant and more effective? Choose THREE answers.

social media
wireless devices
smart phones
automobiles
printed newspapers

Answers

Answer:

(1). social media

(2). wireless devices

(3). smart phones

Explanation:

HELP PLSWhich technologies have made global communication instant and more effective? Choose THREE answers.social

The three technologies that have made global communication instant and more effective are social media, wireless devices, and smart phones.

Here,

Social media platforms have revolutionized the way people communicate globally. They allow individuals to connect, share information, and communicate with others in real-time, regardless of geographical location.

Wireless devices, such as laptops, tablets, and smartwatches, have eliminated the need for physical connections like cables and wires. They allow users to access the internet and communicate with others from virtually anywhere with a wireless signal.

Smartphones combine the features of a mobile phone with advanced computing capabilities. They provide instant communication through voice calls, text messages, emails, and various messaging apps.

Smartphones also allow users to access social media platforms and use wireless internet, making global communication more convenient and efficient.

Know more about communication technologies,

https://brainly.com/question/33037966

#SPJ6

1. A network administrator was to implement a solution that will allow authorized traffic, deny unauthorized traffic and ensure that appropriate ports are being used for a number of TCP and UDP protocols.
Which of the following network controls would meet these requirements?
a) Stateful Firewall
b) Web Security Gateway
c) URL Filter
d) Proxy Server
e) Web Application Firewall
Answer:
Why:
2. The security administrator has noticed cars parking just outside of the building fence line.
Which of the following security measures can the administrator use to help protect the company's WiFi network against war driving? (Select TWO)
a) Create a honeynet
b) Reduce beacon rate
c) Add false SSIDs
d) Change antenna placement
e) Adjust power level controls
f) Implement a warning banner
Answer:
Why:
3. A wireless network consists of an _____ or router that receives, forwards and transmits data, and one or more devices, called_____, such as computers or printers, that communicate with the access point.
a) Stations, Access Point
b) Access Point, Stations
c) Stations, SSID
d) Access Point, SSID
Answer:
Why:

4. A technician suspects that a system has been compromised. The technician reviews the following log entry:
 WARNING- hash mismatch: C:\Window\SysWOW64\user32.dll
 WARNING- hash mismatch: C:\Window\SysWOW64\kernel32.dll
Based solely ono the above information, which of the following types of malware is MOST likely installed on the system?
a) Rootkit
b) Ransomware
c) Trojan
d) Backdoor
Answer:
Why:
5. An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol.
Which of the following configurations should the instructor implement?
a) WPA2
b) WPA
c) EAP
d) WEP
Answer:
Why:

Answers

Network controls that would meet the requirements is option a) Stateful Firewall

Security measures to protect against war driving: b) Reduce beacon rate and e) Adjust power level controlsComponents of a wireless network option  b) Access Point, StationsType of malware most likely installed based on log entry option a) RootkitConfiguration to demonstrate an attack on a weak protocol optio d) WEP

What is the statement about?

A stateful firewall authorizes established connections and blocks suspicious traffic, while enforcing appropriate TCP and UDP ports.

A log entry with hash mismatch for system files suggest a rootkit is installed. To show a weak protocol attack, use WEP on the access point as it is an outdated and weak wireless network security protocol.

Learn more about network administrator  from

https://brainly.com/question/28729189

#SPJ1

Please help I have no idea what to do :(



Write a program that simulates a coin flipping. Each time the program runs, it should print either “Heads” or “Tails”.

There should be a 0.5 probability that “Heads” is printed, and a 0.5 probability that “Tails” is printed.

There is no actual coin being flipped inside of the computer, and there is no simulation of a metal coin actually flipping through space. Instead, we are using a simplified model of the situation, we simply generate a random probability, with a 50% chance of being true, and a 50% chance of being false.

Answers

A Java Script program that simulates a coin flipping, so that each time the program runs, it should print either “Heads” or “Tails” along with the other details given is stated below.

Code for the above coin simulation

var NUM_FLIPS = 10;

var RANDOM = Randomizer.nextBoolean();

var HEADS = "Heads";

var TAILS = "Tails";

function start(){

var flips = flipCoins();

printArray(flips);

countHeadsAndTails(flips);

}

// This function should flip a coin NUM_FLIPS

// times, and add the result to an array. We

// return the result to the caller.

function flipCoins(){

var flips = [];

for(var i = 0; i < NUM_FLIPS; i++){

if(Randomizer.nextBoolean()){

flips.push(HEADS);

}else{

flips.push(TAILS);

}

}

return flips;

}

function printArray(arr){

for(var i = 0; i < arr.length; i++){

println("Flip Number " + (i+1) + ": " + arr[i]);

}

}

function countHeadsAndTails(flips){

   var countOne = 0;

   var countTwo = 0;

   for(var i = 0; i < flips.length; i++){

       if(flips[i] == HEADS){

           countOne+=1;

       }

       else {

           countTwo+=1;

       }

   }

   println("Number of Heads: " + countOne);

   println("Number of Tails: " + countTwo);

}

Learn more about Java Script:
https://brainly.com/question/18554491
#SPJ1

What data type does the in operator return?

Answers

\(\huge\red{Hi!}\)

The Operator data type is any expression that is parsed and returns a value, such as tod() , gui() , rtecall() , = (comparison). An operator is a special symbol or function commonly used in expressions.

Mr. Hoosier has gathered all these data about his finances.

Salary $159,000

Taxable interest $5,600

Municipal Bond interest $15,000

Total Itemized deductions $9,500

The personal exemption is $4700. The standardized deduction for a single filer is 5000.





Single Filer

If Taxable Income is Then tax is:

0-8000 10% of the amount over 0

8000- 35,000 800 + 15% of the amount over 8000

35000- 55,000 4850 + 20% of the amount over 35000

55000- 150,000 8850 + 30% of the amount over 55000

150000 – 200000 37350 + 35% of the amount over 150000

200000 and over 54850 + 40% of the amount over 200000



Married filing jointly:

If Taxable Income is Then tax is:

0-8000 10% of the amount over 0

8000- 35,000 800 + 18% of the amount over 8000

35000- 55,000 4850 + 22% of the amount over 35000

55000- 150,000 8850 + 35% of the amount over 55000

150000 – 200000 37350 + 37% of the amount over 150000

200000 and over 54850 + 45% of the amount over 200000



Please answer each question and you must show your work in order to get partial credit.



What is his average effective tax rate?

Answers

To calculate Mr. Hoosier's average effective tax rate, we need to determine his total tax liability and divide it by his taxable income.

First, we need to calculate his taxable income. We start with his salary of $159,000 and subtract his total itemized deductions of $9,500 and the personal exemption of $4,700.

Taxable Income = Salary - Total Itemized Deductions - Personal Exemption

= $159,000 - $9,500 - $4,700

= $144,800

Next, we calculate his tax liability using the tax brackets for a single filer:

$0 - $8,000: 10% of the amount over $0

Tax = 10% * $8,000 = $800

$8,000 - $35,000: $800 + 15% of the amount over $8,000

Tax = $800 + 15% * ($35,000 - $8,000) = $800 + 15% * $27,000 = $800 + $4,050 = $4,850

$35,000 - $55,000: $4,850 + 20% of the amount over $35,000

Tax = $4,850 + 20% * ($55,000 - $35,000) = $4,850 + 20% * $20,000 = $4,850 + $4,000 = $8,850

$55,000 - $144,800: $8,850 + 30% of the amount over $55,000

Tax = $8,850 + 30% * ($144,800 - $55,000) = $8,850 + 30% * $89,800 = $8,850 + $26,940 = $35,790

Now, we can calculate the average effective tax rate:

Average Effective Tax Rate = Total Tax Liability / Taxable Income

= $35,790 / $144,800

≈ 0.2469 or 24.69%

Therefore, Mr. Hoosier's average effective tax rate is approximately 24.69%.

Describe two factors we should consider when evaluating an argument (discussed in Ch. 6 of THiNK: Critical Thinking and Logic Skills for Everyday Life.) Why are they important?

Answers

Answer:

Explanation:

   

Create a Python program that prints all the numbers from 0 to 4 except two distinct numbers entered by the user.
Note : Use 'continue' statement.

Answers

Here is a Python program that prints all numbers from 0 to 4, excluding two distinct numbers entered by the user, using the 'continue' statement:

```python

numbers_to_exclude = []

# Get two distinct numbers from the user

for i in range(2):

   num = int(input("Enter a number to exclude: "))

   numbers_to_exclude.append(num)

# Print numbers from 0 to 4, excluding the user-entered numbers

for i in range(5):

   if i in numbers_to_exclude:

       continue

   print(i)

```

The program first initializes an empty list called `numbers_to_exclude` to store the two distinct numbers entered by the user.

Next, a loop is used to prompt the user to enter two distinct numbers. These numbers are appended to the `numbers_to_exclude` list.

Then, another loop is used to iterate through the numbers from 0 to 4. Inside the loop, an 'if' condition is used to check if the current number is in the `numbers_to_exclude` list. If it is, the 'continue' statement is executed, which skips the current iteration and proceeds to the next iteration of the loop.

If the current number is not in the `numbers_to_exclude` list, the 'print' statement is executed, and the number is printed.

This program ensures that the two distinct numbers entered by the user are excluded from the output, while all other numbers from 0 to 4 are printed.

For more such answers on Python

https://brainly.com/question/26497128

#SPJ8

Highlight three (3) typical User Requirements and three (3) typical System
Requirements of the ATM system. Use both Natural Language and Form-Based
Specifications to illustrate the typical requirements

Answers

As part of each transaction, an user will be obligated to insert an ATM card and enter a personal identification number (PIN), both of which will be sent to the bank for validation.

What is ATM?

ATMs are convenient because they allow consumers to perform quick self-service transactions such as deposits, cash withdrawals, bill payments, and account transfers.

Fees for cash withdrawals are frequently charged by the bank where the account is held, the operator of the ATM, or both.

A user will be required to insert an ATM card and enter a personal identification number (PIN) as part of each transaction, both of which will be sent to the bank for validation.

The customer's unique ID must be accepted by the ATM system. The ATM system must accept the customer's choice for a variety of banking transactions.

The ATM system must accept the customer's account type for deposits, balance inquiries, and payments on account.

Thus, these are some of the requirements for ATM.

For more details regarding ATM, visit:

https://brainly.com/question/3450346

#SPJ1

The area of a parallelogram is 18 square units.one side of the parallelogram is 24 units long.The other side is 6 unit long. which could b the parallelograms height select all apply

The area of a parallelogram is 18 square units.one side of the parallelogram is 24 units long.The other

Answers

Answer:

\(Height = \frac{3}{4}\ unit\)

\(Height = 3\ units\)

Explanation:

Given

Shape: Parallelogram

\(Area = 18 unit^2\)

\(Side\ 1 = 24 units\)

\(Side\ 2 = 6 units\)

Required

Determine possible heights of the parallelogram

Area of parallelogram is:

\(Area = Base * Height\)

Make Height the subject of formula

\(Height = \frac{Area}{Base}\)

When Base = 24 units;

\(Height = \frac{18}{24}\)

\(Height = \frac{3}{4}\ unit\)

When Base = 6 units;

\(Height = \frac{18}{6}\)

\(Height = 3\ units\)

When Base = 24 units

When Base = 6 units

Height: 3

Twisted pair cables characteristics

Answers

Twisted pair cables are a type of copper cable consisting of two insulated wires twisted together to reduce electromagnetic interference.

What varieties do they come in?

They come in two varieties, shielded and unshielded, and can support data transmission rates up to 10 Gbps over short distances. They are commonly used for Ethernet networking, telephone systems, and other communication applications.

Twisted pair cables have a maximum length of around 100 meters, and their performance can be affected by factors such as cable quality, interference from other devices, and environmental conditions.

Read more about twisted pair cables here:

https://brainly.com/question/13187188

#SPJ1

The following loop is intended to print the multiples of 5 from 20 to 45 inclusive. How would you change the code to make it work?

Answers

The answer of the question based on the  loop is intended to print the multiples of 5 from 20 to 45 inclusive is given below,

What is looping Statements?

Looping statements are programming constructs that allow you to execute a set of instructions repeatedly, based on a specific condition or a predetermined number of iterations. Loops are used to automate repetitive tasks, perform iterations over a sequence of items or data, and process collections of data.

for i in range(20, 45):

   if i % 5 == 0:

       print(i)

To print the multiples of 5 from 20 to 45 inclusive, we need to change the range function to include 45 and modify the if condition to also include the upper limit. Here's the corrected code:

for i in range(20, 46):

   if i % 5 == 0:

       print(i)

This code will print the multiples of 5 from 20 to 45, including both 20 and 45.

To know more about Function  visit:

https://brainly.com/question/23755229

#SPJ1

Other Questions
what are some causes of high unemployment in a country How do atoms of elements become huge macromolecules? Find the Revenue Procedure that announced the 2022 individualincome tax brackets. When did the IRS issue it? The branch of law dealing with the definition and enforcement of all private or public rights, as opposed to criminal matters. Spells out rights and duties that exist between persons and between persons and their governments, and the relief available when a person's rights are violated. Thomas Jefferson would most likely agree with which of the following statements? A. Government policies should be based on religious principles. B. A nation that is governed by the church will not be democratic. C. Every government should officially support one religion. D. History shows that people would rather be governed by the church. Select the correct answer.Solve .A. B. C. D. In a certain desert environment there are a lot of smallrodents. There also happen to be a lot of snakes thatfeed on the rodents. The ratio of rodents to rodenteating snakes is 13 to 3. If there are 4,000 snakes in thearea, about how many rodents are there? Show yourwork.WILL GIVE BRAINLIEST!!!! A cylinder has a height of 5 ft and a volume of 80 ft3. What is the radius? In the establishment and free exercise clauses, the Framers provided for clear limits on the federal government's ability to interfere with this liberty: Freedom of religion O Freedom of the press O Freedom of speech O Freedom to petition O Freedom to peaceably assemble c) how many people in the u.s. have a type o blood type? submit your answer below in millions and rounded to two deci HELP!!Which statement best evaluates the effectiveness of this conclusion paragraph? A. The conclusion is ineffective because it fails to restate the thesis statement in a new way.B. The conclusion is ineffective because it leaves out a satisfying closing statement.C. The conclusion is ineffective because it brings in new information not addressed in the main points.D. The conclusion is ineffective because it does not summarize the main points of the essay. Show full solution: Find all relative extrema and saddle points of the following function using Second Derivatives Testa. f(x,y) =x^4- 4x^3 + 2y^2+ 8xy +1b. f(x,y) = e^xy +2 Course: Casino1. What are the different source of revenue for a Casino operation?2. Who is the PIT Boss? Explain his role and function.3. How can a Casino be economically, socially & environmentally responsible in its operations?4. What are the issues caused by Political, Economic, Social, Technology and Legal matters to a casinooperation?5. You are the Pit Boss of a leading Casino. Your casino is having a problem with fake US dollars in circulation t your casino. What will you do? A(n) __________ is a unique serial number that identifies each SIM, engraved on the SIM during manufacturing. Which area best describes a continental slope?thick deposits of sediments carried out from landthe surf area along coastlinesarea of land dropping steeply towards deep ocean basins75-mile shallow flat area just off coastlines Find the value of each of the following.Increase 60 by 35 percent which nation suffered the most losses in WWII?a,USA b,Germany c,ukd,USSR Simplify polynomial: 10xyz(20xyz-30xyz) Which of the following is the lowest level of party organization? Regional Precincts Counties States line c has a slope of -9/2. line d is parallel to like c. what is the slope of line d?