a) Code a statement that creates an instance of an Account class using the default constructor and stores the object that’s created in a variable named account.
b) Code a statement that creates an instance of the Account class using a constructor that has two parameters named firstName and age, and store the object in a variable named account. Assume that variables with those names have already been declared and initialized so you can pass those variables to the constructor.
c) Code a statement that sets the value of the Age property of an Account object named account to the value in a variable named newAge.
d) Code a statement that will get the value of a public static field named Count that’s defined in the Account class, and store the value in a new int variable named count. Assume that you’ve already created an object from this class that’s named account.

Answers

Answer 1

Answer:

a)

Account account = new Account();

b)

Account account = new Account(firstName, age);

c)

account.Age = newAge;

d)

int count = Account.Count;

Explanation:

a)

new is the keyword which is used to create an object.

Account is the class name.

account is the name of an object of class Account.

account object is created to access the class Account.

Account() is the constructor of Account class. This is the default constructor and it has no parameters. Constructor has the same name as class. When a account object is created, constructor Account will be invoked.

b)

Account is the class name.

account is the name of an object of class Account.

Account() is the constructor of Account class. This is the parameterized constructor and it has two parameters i.e. firstName and age. Constructor has the same name as class. When a account object is created, constructor Account will be invoked.

c)

account.Age = newAge;

Here account is the object name. The Age property to access and update the private field of the Account class is set to the variable named newAge.

d)

This int count = Account.Count; statement gets the value of a public static field named Count that’s defined in the Account class, and stores the value in a new int variable named count.


Related Questions

In the Gradient Descent algorithm, we are more likely to reach the global minimum, if the learning rate is selected to be a large value.

a. True
b. False

Answers

False iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii

Answer:

false i think.

Explanation:

Gradient Descent is more likely to reach a local minima. because starting at different points and just in general having a different starting point, will lead us to a different local minimum( aka the lowest point closest to the starting point). if alpha(the learning rate) is too large, gradient descent may fail to converge and may even diverge.

Given an integer n and an array a of length n, your task is to apply the following mutation to a:
Array a mutates into a new array b of length n.
For each i from 0 to n - 1, b[i] = a[i - 1] + a[i] + a[i + 1].
If some element in the sum a[i - 1] + a[i] + a[i + 1] does not exist, it should be set to 0. For example, b[0] should be equal to 0 + a[0] + a[1].
Example
For n = 5 and a = [4, 0, 1, -2, 3], the output should be mutateTheArray(n, a) = [4, 5, -1, 2, 1].
b[0] = 0 + a[0] + a[1] = 0 + 4 + 0 = 4
b[1] = a[0] + a[1] + a[2] = 4 + 0 + 1 = 5
b[2] = a[1] + a[2] + a[3] = 0 + 1 + (-2) = -1
b[3] = a[2] + a[3] + a[4] = 1 + (-2) + 3 = 2
b[4] = a[3] + a[4] + 0 = (-2) + 3 + 0 = 1
So, the resulting array after the mutation will be [4, 5, -1, 2, 1].
Input/Output
[execution time limit] 3 seconds (java)
[input] integer n
An integer representing the length of the given array.
Guaranteed constraints:
1 ≤ n ≤ 103.
[input] array.integer a
An array of integers that needs to be mutated.
Guaranteed constraints:
a.length = n,
-103 ≤ a[i] ≤ 103.
[output] array.integer
The resulting array after the mutation.

Answers

Answer:

The program written in Java is as follows

import java.util.Scanner;

public class mutilate {

public static void main(String [] args) {

Scanner input = new Scanner(System.in);

int n;

System.out.print("Array Length: ");

n = input.nextInt();

while(n<1 || n > 103)  {

    System.out.print("Array Length: ");

n = input.nextInt();

}

int a []= new int [n];

int b []= new int [n];

System.out.print("Enter Elements of the Array: ");

for(int i =0;i<n;i++)  {

 a[i] = input.nextInt();

}

System.out.print("Output: ");

for(int i =0;i<n;i++)  {

 if(i == 0)   {

     b[i] = 0+a[i]+a[i+1];

 }

 else if(i == n-1)   {

     b[i] = a[i - 1]+a[i]+0;

 }

 else   {

 b[i] = a[i - 1]+a[i]+a[i+1];    

 }

 System.out.print(b[i]+" ");

}

}

}

Explanation:

This line allows the program accepts user input

Scanner input = new Scanner(System.in);

This line declares integer n

int n;

The next two line prompts user for length of the array and also accepts input

System.out.print("Array Length: ");

n = input.nextInt();

The following while iteration ensures that the user input is between 1 and 103

while(n<1 || n > 103)  {

    System.out.print("Array Length: ");

n = input.nextInt();

}

The next two lines declares array a and b

int a []= new int [n];

int b []= new int [n];

The next for iteration allows user enter values for array a

System.out.print("Enter Elements of the Array: ");

for(int i =0;i<n;i++)  {

 a[i] = input.nextInt();

}

The next for iteration calculates and prints the values for array b based on the instruction in the question

System.out.print("Output: ");

for(int i =0;i<n;i++)  {

 if(i == 0)   {

     b[i] = 0+a[i]+a[i+1];

 }

 else if(i == n-1)   {

     b[i] = a[i - 1]+a[i]+0;

 }

 else   {

 b[i] = a[i - 1]+a[i]+a[i+1];    

 }

 System.out.print(b[i]+" ");

}

Qla
What are the activities a Database Designer will do if using the SDLC to design a Database [10]
Q1b
List the five main components of Access Database and state their uses [10]

Answers

Answer:a

What are the activities a Database Designer will do if using the SDLC to design a Database [10]

Q1b

List the five main components of Access Database and state their uses [1

Explanation:

What is indirect program memory addressing? Explain the working of the following instructions?

a) JMP AX
b) JMP LIST[DX]
c) JMP NEAR PTR[DI+3]

Answers

Indirect main memory addressing is described as the method in which the variable's address is stored in a mind register and also a command is utilized to point towards the memory registers which hold the register. Instruction is used to direct towards a register that displays the results of the variables. The register, in turn, refers to that variable's address in simplistic words. As just a result, it is indeed considered a passive program, memory address.

The instructions operate as follows:

a)

JMP AX :

The JMP instruction is being used to execute an unconditional jump.AX is indeed the label's name. JMP AX codes are being used to transfer control of the flow program to the AX label.

b)

JMP LIST:

The JMP command can be used to execute an unconditional jump, JMP LIST[DX] is the label's name.  The JMP LIST[DX] program is being used to transfer control of its flow programs to the specified section. It is the segment to which the flow control is transmitted.

c)

JMP NEAR PTR[DI+3]: 

Unconditional jumps could be done with the JMP command as you'll see, the label is JMP NEAR PTR[DI+3]. It's being used to transmit flow control to a particular section, throughout this case [DI+3]. The close keyword indicates that perhaps the code segment would be in the line of code being nearby.

Learn more:

brainly.com/question/20320915

A member of the human resources department received the following email message after sending an email containing benefit and tax information to a candidate: Your message has been quarantined for the following policy violation external potential PII.Pls contact the IT security admin for further details. Which of the following BEST describes why this message was received?a. The DLP system flagged the message. b. The mail gateway prevented the message from being sent to personal email addresses c. The company firewall blocked the recipient's IP address. d. The file integrity check failed for the attached files.

Answers

Answer:

a. The DLP system flagged the message.

Explanation:

Data Leaked Prevention System is the software that detects potential data breaches that may result in the future. It detects the possible data breach, then monitors it and immediately blocks any sensitive data. DLP system is widely used by businesses. The human resource team received a message because sensitive information about the business benefits and tax is shared with a candidate.

If the processor has 32 address lines in its address bus; i.e. 32-bit address range, what is its address space or range; i.e. what is the smallest and largest address that can be represented

Answers

Answer:

The answer is "0 to 4294967295"

Explanation:

Given bit:

32 bits

Calculating smallest and largest bits:

In any processor, it works only on the 0 and 1 bit and it also stores 0 and 1 values. so, the smallest address in bit value is= 0 and the largest bit value can be defined as follows:

largest address value in bits:

[tex]\Longrightarrow 2^{32}-1\\\\\Longrightarrow 4294967296 -1\\\\\Longrightarrow 4294967295\\\\[/tex]

smallest address= 0

largest address = 4294967295

In using cloud infrastructures, the client necessarily cedes control to the CP on a number of issues that may affect security
a. True
b. False

Answers

Answer:

A. True

Explanation:

The correct option is A. True.

Actually, in using cloud infrastructures, the client necessarily cedes control to the CP on a number of issues which may affect security. It may have to restrict port scans and even penetration testing. Moreover, the service level agreements may not actually guarantee commitment to offer such services on the part of the CP. This may result in leaving a gap in security defenses.

Also, when the control of the CP changes, it's evident that the terms and conditions of their services may also change which may affect security.

Internet radio probably uses UDP because it is a connection-less protocol and streaming media typically does not require an established connection.

a. True
b. False

Answers

Answer:

True

Explanation:

Please mark me as the brainiest

You are in the process of building a computer for a user in your organization. You have installed the following components into the computer in Support:AMD Phenom II X4 quad core processor8 GB DDR3 memoryOne SATA hard drive with Windows 7 installedYou need to make sure the new components are installed correctly and functioning properly. You also need to install a new SATA CD/DVD drive and make sure the computer boots successfully.Perform tasks in the following order:Identify and connect any components that are not properly connected.Use the PC tools on the shelf to test for components that are not functioning. Replace any bad components with the known good parts on the shelf.Install the required CD/DVD drive in one of the drive bays and connect the power cable from the power supply.

Answers

Answer:

i would check all connections from the hard drive and power supply and check your motherboard for any missing sauters and or loose no contact connections

Explanation:

Điều gì sẽ xảy ra nếu bỏ một ly nước nóng vào tủ đông đá?

Answers

Answer:

A glass of hot water will freeze, of course, but at a faster rate than a glass of normal temperature water

industrial advantages of using a waterfall model for library system

Answers

Answer:

It allows for departmentalization and managerial control. Simple and easy to understand and use. Easy to manage due to the rigidity of the model – each phase has specific deliverables and a review process. Phases are processed and completed one at a time.

Explanation:

The web development team is having difficulty connecting by ssh to your local web server, and you notice the proper rule is missing from the firewall. What port number would you open on your webserver?

a. Port 21
b. Port 22
c .Port 25
d. Port 80
e. Port 443

Answers

Answer:

Option b (Port 22) seems to the appropriate choice.

Explanation:

Below seem to be some measure you should take to correct this mistake.

Verify whether Droplet's host IP address seems to be right.  Verify existing connection supports communication over all the utilized SSH port. Any access points can be able to block port 22 and sometimes customized SSH. For illustration, you could do this by checking different hosts who used the same port, using only a recognized working SSH connection. These could help you identify unless the current problem is not particular to clients' Droplet. Authenticate the Droplet configuration settings. Verify that they're not being configured to DROP 's preferred policy, and do not apply the port to require connectivity.

The SSH server also operates on port 22, by default.  

Other choices don't apply to the specified scenario. So that the argument presented above will be appropriate.

The port number would you open on your webserver is Port 22

For better understanding let's explain SSH means.

Service Name and Transport Protocol Port Number Registry. where the service name is Secure Shell (SSH) Protocol and it has the port number of 22 therefore this mean that SSH will only work with port 22 using it for other port will only result in difficulty in connection. SSH has other names like Secure Shell or Secure Socket Shell. it is known as a network protocol that helps its users with system administrator.

From the above we can therefore say that the answer The port number would you open on your webserver is Port 22, is correct

Learn more about SSH and port from:

https://brainly.com/question/13054022

Tuesday
write the
correct
answer
Text can be celected using
2 A mouse
device of
is
ch
3 Scrolls bars are
buttons which assist
upwards downwards
sideways to
skole

Answers

Answer:

?

Explanation:

these are instructions to a question?

As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not include information previously shared / agreed upon by the sender and receiver.)

Answers

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

During transit, the message was certainly not changed. Anybody with the private key – preferably even a preferred sender sent out this letter.

Q2) Answer the following:
1- Expression d=i++; causes:
a. The value of i incremented by 1
b- The value of i assigned to d
C- The value of i assigned to d then i incremented by 1
d- The value ol i incremented by 1 then assigned to d.
CO
SA​

Answers

Answer:

D

Explanation:

The value of i is incremented by one then assigned to d

. In the select algorithm that finds the median we divide the input elements into groups of 5. Will the algorithm work in linear time if we divide it into groups of 7? How about 3? Explain your answer--- the asymptotic run time in either case.

Answers

Answer:

we have that it grows more quickly than linear.

Explanation:

It will still work if they are divided into groups of 77, because we will still know that the median of medians is less than at least 44 elements from half of the \lceil n / 7 \rceil⌈n/7⌉ groups, so, it is greater than roughly 4n / 144n/14 of the elements.

Similarly, it is less than roughly 4n / 144n/14 of the elements. So, we are never calling it recursively on more than 10n / 1410n/14 elements. T(n) \le T(n / 7) + T(10n / 14) + O(n)T(n)≤T(n/7)+T(10n/14)+O(n). So, we can show by substitution this is linear.

We guess T(n) < cnT(n)<cn for n < kn<k. Then, for m \ge km≥k,

\begin{aligned} T(m) & \le T(m / 7) + T(10m / 14) + O(m) \\ & \le cm(1 / 7 + 10 / 14) + O(m), \end{aligned}

T(m)

 

≤T(m/7)+T(10m/14)+O(m)

≤cm(1/7+10/14)+O(m),

therefore, as long as we have that the constant hidden in the big-Oh notation is less than c / 7c/7, we have the desired result.

Suppose now that we use groups of size 33 instead. So, For similar reasons, we have that the recurrence we are able to get is T(n) = T(\lceil n / 3 \rceil) + T(4n / 6) + O(n) \ge T(n / 3) + T(2n / 3) + O(n)T(n)=T(⌈n/3⌉)+T(4n/6)+O(n)≥T(n/3)+T(2n/3)+O(n) So, we will show it is \ge cn \lg n≥cnlgn.

\begin{aligned} T(m) & \ge c(m / 3)\lg (m / 3) + c(2m / 3) \lg (2m / 3) + O(m) \\ & \ge cm\lg m + O(m), \end{aligned}

T(m)

 

≥c(m/3)lg(m/3)+c(2m/3)lg(2m/3)+O(m)

≥cmlgm+O(m),

therefore, we have that it grows more quickly than linear.

26. The
operator will cause a record to
be selected only if two or more
conditions are satisfied
In MS access

Answers

Answer:

AND

The  AND operator will cause a record to  be selected only if two or more

conditions are satisfied.

2- (8 point) Write a program using the instructions below. Assume that integers are stored in 4 bytes. a) Define an array of type int called apples with five elements, and initialize the elements to the even integers from 2 to 10. b) Define a pointer aPtr that points to a variable of type int. c) Print the elements of array values using a for statement. d) Write two separate statements that assign the starting address of the array to pointer variable aPtr. e) What physical address is aPtr pointing to? f) Print the elements of array values using pointer/offset notation. g) What address is referenced by aPtr + 3? What value is stored at that location? h) Assuming aPtr points to apples[4], what address is referenced by aPtr -= 4? What value is stored at that location?

Answers

Answer:

a)  

int apples [5] = {2, 4, 6, 8, 10};

b)

int *aPtr   //this is the pointer to int

Another way to attach a pointer to a an int variable that already exists:

int * aPtr;

int var;

aPtr = &var;

c)

for (int i = 0; i < size; i++){

       cout << values[i] << endl;    }

d)  

   aPtr = values;

   aPtr = &values[0];    

both  the statements are equivalent

e)

If its referring to the part d) then the address is:

cout<<aPtr;

f)

     for (int i = 0; i < size; ++i) {

            cout<<*(vPtr + i)<<endl;    }

g)

   cout << (aPtr + 3) << endl;  // address referenced by aPtr + 3

   cout << *(aPtr + 3) << endl; // value stored at that location

This value stored at location is 8

h)

    aPtr = &apples[4];

    aPtr -= 4;

    cout<<aPtr<<endl;

    cout<<*aPtr<<endl;  

Explanation:        

a)

int apples [5] = {2, 4, 6, 8, 10};

In this statement the array names is apples, the size of the array is specified in square brackets. so the size is 5. The type of array apples is int this means it can store integer elements. The values or elements of the array apples are even integers from 2 to 10. So the elements of array are:

apples[0] = 2

apples[1] = 4

apples[2] = 6

apples[3] = 8

apples[4] = 10

b)

In this statement int *aPtr  

The int* here is used to make the pointer aPtr points to integer object. Data type the pointer is pointing to is int. The asterisk symbol used with in makes this variable aPtr a pointer.

If there already exists an int type variable i.e. var and we want the pointer to point to that variable then declare an int type pointer aPtr and aPtr = &var; assigns the address of variable var to aPtr.

int * aPtr;

int var;

aPtr = &var;

c)

The complete program is:

int size= 5;

int values[size] = {2,4,6,8,10};

for (int i = 0; i < size; i++){

       cout << values[i] << endl; }

The size of array is 5. The name of array is values. The elements of array are 2,4,6,8,10.

To print each element of the values array using array subscript notation, the variable i is initialized to 0, because array index starts at 0. The cout statement inside body of loop prints the element at 0-th index i.e. the first element of values array at first iteration. Then i is incremented by 1 each time the loop iterates, and this loop continues to execute until the value of i get greater of equal to the size i.e. 5 of values array.

The output is:

2

4

6

8

10

d)

aPtr = values;

This statement assigns the first element in values array to pointer aPtr. Here values is the address of the first element of the array.

aPtr = &values[0];    

In this statement &values[0] is the starting address of the array values to which is assigned to aPtr. Note that the values[0] is the first element of the array values.

e)

Since &values[0] is the starting address of the array values to which is assigned to aPtr. So this address is the physical address of the starting of the array. If referring to the part d) then use this statement to print physical address is aPtr pointing to

cout<<aPtr;

This is basically the starting address of the array values to which is assigned to aPtr.

The output:

0x7fff697e1810                

f)

i variable represents offset and corresponds directly to the array index.

name of the pointer i.e. vPtr references the array

So the statement (vPtr + i) means pointer vPtr that references to array values plus the offset i array index that is to be referenced. This statement gives the address of i-th element of values array. In order to get the value of the i-th element of values array, dereference operator * is used.  It returns an ith value equivalent to the address the vPtr + i is pointing to. So the output is:

2

3

6

8

10

g)

values[0] is stored at 1002500

aPtr + 3 refers to values[3],

An integer is 4 bytes long,

So the address that is referenced by aPtr + 3 is

1002500 + 3 * 4 = 1002512

values[3] is basically the element of values array at 3rd index which is the 4th element of the array so the value stored at that referred location  is 8.

h)

Given that aPtr points to apples[4], so the address stored in aPtr is

1002500 + 4 * 4 = 1002516

aPtr -= 4  is equivalent to aPtr = aPtr - 4

The above statement decrements aPtr by 4 elements of apples array, so the new value is:

1002516 - 4 * 4 = 1002500

This is the address of first element of apples array i.e 2.

Now

cout<<aPtr<<endl; statement prints the address  referenced by aPtr -= 4 which is 1002500  

cout<<*aPtr<<endl;  statement prints the value is stored at that location which is 2.

Write an interactive program to calculate the volume and surface area of a three-dimensional object.

Answers

Answer:

I am writing a Python program:

pi=3.14 #the value of pi is set to 3.14

radius = float(input("Enter the radius of sphere: ")) #prompts user to enter the radius of sphere

surface_area = 4 * pi * radius **2 #computes surface area of sphere

volume = (4.0/3.0) * (pi * radius ** 3) #computes volume of sphere

print("Surface Area of sphere is: ", surface_area) #prints the surface area

print("Volume of sphere is: {:.2f}".format(volume)) #prints the volume        

Explanation:

Please see the attachment for the complete interactive code.

The first three lines of print statement in the attached image give a brief description of the program.

Next the program assigns 3.14 as the value of π (pi). Then the program prompts the user to enter the radius. Then it computes the surface area and volume of sphere using the formulas. Then it prints the resultant values of surface area and volume on output screen.

The psuedocode for this program is given below:

PROGRAM SphereVolume

pi=3.14

NUMBER radius, surface_area, volume  

INPUT radius

COMPUTE volume = (4/3) * pi* radius ^3

COMPUTE surface_area = 4 * pi * radius ^ 2

OUTPUT volume , surface_area

END

) Write the JS code to load the 3rd party script before ready event triggers and after successful load show your name on the browser with a message

Answers

Answer:

Following are the code to this question:

var id= document.createElement('script');//defining id varaible that uses the createElement method  

ld.src = "https://code.jquery.com/jquery-3.5.1.min.js";//defining id varaible with src that holds the source link

alert("The loaded Script is: ");//defining alert box that print Script loaded.

Explanation:

In the above-given code, an id variable is defined that uses the createElement method, which helps to create the specified name with the Element Node, and in the next line, it uses the src with the id variable, that store the link, it also helps to loads the 3rd party script, which is displayed in an alert msg box.

If Scheme were a pure functional language, could it include DISPLAY ? Why or why not?​

Answers

Answer:

When Scheme is a pure functional language, it cannot include the function DISPLAY. Since the pure functional languages will return the same value whenever the same expression is evaluated, and the DISPLAY would be the output and thus it cannot be part of the purely functional language. Thus in the pure functional language we can evaluate the expressions with the same arguments and it returns the same value since there is no state to change.

Explanation:

What are the basic characteristics of object-oriented analysis and design (OOAD)? How does OOAD compare to structured analysis and design (SAD)?

Answers

Answer:

Basic characteristics of OOAD and compression with SAD can be defined as follows:

Explanation:

The Object-oriented analysis is described as a design and analysis system like an application, that uses Oops programming. It is the measurement model, that is the presentation, which became a part of the object-based review.  

The features of OOAD can be defined as follows.  

The complex issues are simply solved.    The operation of very fast recovery.  The stability in condition changes. Its conceptual method for resolving its extremely complex problems.

The difference in OOAD and SAD can be defined as follows:

The OOAD mainly focuses upon the design of objects, it can be used in highly complex logical systems, whereas the SAD focuses on data analysis systems and processes.  The OOAD uses the framework to target data, but the SAD is process-oriented. It uses class and UML diagrams, but SSAD uses DFDs to extract the element, it has many limited steps to prepare and execute, but OOAD relies mostly on initial growth. This method is being developed in the course of the process.

#Recall that input from a user is always in the form of a string. #Write a function called "input_type" that gets user input and #determines what kind of string the user entered. The user input #will be supplied as an argument to the function like normal. # # - Your function should return "integer" if the string only # contains characters 0-9. # - Your function should return "float" if the string only # contains the numbers 0-9 and at most one period. # - You should return "boolean" if the user enters "True" or # "False". # - Otherwise, you should return "string". #Write your function here!

Answers

Answer:

Here is the Python program:

def input_type(input_string): #function that takes a string as input and returns the type of that string

   try:   #used to test a block of code for input string type              

       if type(eval(input_string)) == float: #if the type of the string is float

           return "float" #function returns float

       elif type(eval(input_string)) == int: #else if the type of the string is int

           return "integer"#function return integers

       elif type(eval(input_string)) == bool:#else if the type of the string is bool

           return "boolean" #function return boolean

   except: #if the type of the string is neither int, bool nor float

       return "string" #function return boolean

#following statements are used to  test the working of the above function

print(input_type(" ")) #prints string

print (input_type ("False")) #prints boolean

print (input_type ("7.432621")) #prints  float

print (input_type("2788"))#prints int

Explanation:

The function input_type() takes a user input and returns the type of that string input the user entered. The user input can be one of the following types:

int which is the data type of an integer for example 1, 2, 3 etc

float which is the data type of a floating point number for example 1.2, 3.4 etc

bool which is the data type of a boolean for example True or False

string that can be characters for example an empty space character " "

try block here is used to generate an exception and it is used to test a block in the code that checks for the type of the user input. The except block here is used to handle that error. This is executed when the try part raises an error.

Inside the try block, the if and elif statements check the type of the string.

if type(eval(input_string)) == float: statement checks if the type of the string is float. Here the eval() method is used to convert the input string because the user input is basically a string value. So this method evaluates the input_string.

type() method is used to return the type of that evaluated user input string. If condition checks if type(eval(input_string)) which is the type of the evaluated input string is equal to float. If this condition evaluates to true then the function returns "float" otherwise it moves to the next elif statement. Similarly the type of the user input is checked for int in elif part and if both these if and elif conditions evaluate to false then the next elif statement is executed that checks the user input to be bool. If all these three if elif statements evaluate to false then the except part executes which returns "string". The program along with its output is attached in a screenshot.    

I have an PC and it has one HMDI port but I need two monitors other problem is I need one monitor to connect to my USB drive work system and one to stay on my regular windows system how can I do this?

Answers

Answer:

You'll need dual monitor cables and an adapter.

Explanation:

First Step

Position your monitors on your desk or workspace. Make sure the systems are off.

Second Step

Make sure your power strip is close by. Then plug your power strip and connect the first monitor to your PC via your HDMI

Use an adapter to do the same for the second monitor.

Turn the entire system on

Third Step

On your PC, right click on a blank place in your home screen and click on Display Settings.

If you want to have two separate displays showing the same thing, select Duplicate, but if you want to have the two displays independent of each other, select Extend Display.

Apply the settings and select Done.

Giving BRANLIEST IFFF CORRECT

Which type of chart or graph shows the contribution of each item in a total of 100%?

Bar graph

Column chart

Line graph

Pie chart

Answers

Answer:

pie chart

Explanation:

pie chart shows percentage per item

Answer:

pie chart

Explanation:

what do you mean by hardware and software?

Answers

Answer:

I think the above information will help you a lot.

Have a nice day.

Please read the screen shot brainly is not letting me write the whole thing

Output is the act of is the act of entering the data to the computer?​

Answers

Answer:

Output is the act of the computer display information based on your input

Explanation:

Funny thing is that output is the exact opposite of what you just described

what is computer with figure​

Answers

Answer:

A computer is an electronic device that accept raw data and instructions and process it to give meaningful results.

convert decimal number into binary numbers (265)10

Answers

Answer:

HELLOOOO

Alr lets start with steps by dividing by 2 again and againn..

265 / 2 = 132 ( rem = 1 )

132 / 2 = 66 ( rem = 0 )

66/2 = 33 ( rem = 0 )

33/2 = 16 ( rem = 1 )

16/2 = 8 ( rem = 0 )

8/2 = 4 ( rem = 0 )

4/2 = 2 ( rem = 0 )

2/2 = 1 ( rem = 0 )

1/2 = 0 ( rem = 1 )

now write all the remainders from bottom to up

100001001

is ur ans :)))

A TCP entity opens a connection and uses slow start. Approximately how many round-trip times are required before TCP can send N segments

Answers

Answer:

Round trip times required =  log2N

Explanation:

The round-trip times required before TCP can send N segments using a slow start is log2N. we can arrive at this by looking at the mode of operation of TCP which is  at the 1st time of using a TCP it starts the congestion window as 1 then it  sends an initial segment. When the acknowledgement of the initial segment arrives, TCP increases the congestion window to 2 and then sends 2 segments, When the 2 acknowledgements of the segments sent out arrives, they each increase the congestion window by one, thereby increasing the congestion window to 4 . therefore it takes   log2N round trips before TCP can send N segments

Other Questions
How are intercalary chapters used in the The Grapes of Wrath? whats the beginning of life called How many solutions does the system have? y=-5x+1 y=1-5x PLEASE HELP ME !!!given a function y = 5x - 9x - 5from the graph, determine the value of x when y = 0 The location where sea floor spreading occurs is called the Express the time spent to daily life activities during holidays as a fraction of whole day 1. Represent the fractions in pictorial form. 2. Write the fractions in simplest form. 3. Arrange them in ascending order. Determine whether each sequence is a geometric sequence. If yes, then state the common ratio.5, 10, 15, 20,... An isolated village of about 1,000 people in a developing nation may be hunting and raising only enough crops to feed themselves. Such a village may have fewer than half their children surviving to adulthood. This struggling village primarily reflects the result of which revolution? Group of answer choices A ball is dropped from the top of a building. The table shows its height in feet above ground at the top of each bounce. What is the height of the ball at the top of bounce 6? 10 pipes can fill a tank in 16 minutes,in how many minutes would 8 pipes fill the same tank ,proportion question What was the main conflict between white settlers and Native Americans on the Western Frontier? Write 7 words that help define the term health what is the value of the discriminant of the quadratic equation 1 = 5x2 2x, and what does its value mean about the number of real number solutions the equation has? The levels of nitrogen and ___ in the atmosphere remain fairly constant but the levels of other gases may vary. Reduce any fractions to lowest terms. Don't round your answer, and don't use mixed fractions. 4x+4\leq9x+84x+49x+8 Mars Inc. has a defined benefit pension plan. On December 31 (the end of the fiscal year), the company received the PB0 report from the actuary. The following information was included in the report: ending PBO, $110,000 benefits paid to retirees. $10,000, interest cost, $7,200. The discount rate applied by the actuary was 8%. What was the beginning PBO? A) $100,000 B) $112,000. C) $90,000. D) $107,200. Amy, a nature photographer, randomly sampled photographs she took within the last year. She wanted to find out how many of her photographs contained flowers. The proportion of photographs that had flowers was 0.61, with a margin of error of 0.04. Construct a confidence interval for the proportion of her photographs taken within the last year contained flowers. 5^2x+45^-x+1-125=0 How do you find the equation of a parabola given the coordinates? if the current time is 10:35 how long until it turns 3:15