Answer:
8
Explanation:
(2*3+2)=8
Hope this helped, and have a good day!
When you are trying to anticipate user errors, which do you think is better to use—an if else statement or a try except statement? Why? Can you think of a rule that you could follow to determine which you should use?
Answer:
try except
Explanation:
You shouldn't use an if else statement for anticipating user errors since try-except was made for executing statements until encountering an error, while if-else is checking for a condition and if its not met, it will do an else.
API defines ____ for applications written in a procedural programming language and _____ for applications in object-oriented languages.
API defines procedure calls for applications written in a procedural programming language and classes for applications in object-oriented languages.
What is API?API is known to be the short form of Application Programming Interface. This is known to be a software that acts as an intermediary.
Note that it helps two applications to communicate to one other and as such, API state out procedure calls for applications written in a procedural programming language and classes for applications in object-oriented languages.
Learn more about API from
https://brainly.com/question/12987441
#SPJ1
Which type of digital storage stores information primarily on physical computer components in the photographer's possession?
O internal hard drive
O fireproof safe
O cloud storage
O optical storage
Answer:
Internal Hard Drive
Explanation:
D). Name the piece of hardware found in a tablet computer that is both an Input and output device?
Some applications require that records be retrievable from anywhere in the file in an arbitrary sequence. These files are known as ___________.
Answer:
random access files
Explanation:
Some applications require that records be retrievable from anywhere in the file in an arbitrary sequence. These files are known as ___________.
✓ RANDOM ACCESS FILES
Difference between misinformation and disinformation.
A command line above the worksheet where text, numbers, and formulas are entered into a worksheet. Question 18 options: Formula Formula Bar Worksheet Workbook
Formula bar is a command line above the worksheet where text, numbers, and formulas are entered into a worksheet.
What is the formula bar?Formula bar is the white strip like space in above the worksheet, where what we write in the sheet, the text and formula are displayed. It is a place where you can edit the text and formula.
Thus, Formula bar is a command line above the worksheet where text, numbers, and formulas are entered into a worksheet.
Learn more about formula bar
https://brainly.com/question/14694227
#SPJ1
Design, implement and test a Java class that processes a series of triangles. The triangle specification will be identical to that in Programming Assignment #2 (part A). As in that assignment, you will read in the three sides of the triangle, check the input for errors (and handle them if found), classify the triangle and compute its area. For this assignment, triangle data will be read from an input file and the program’s output will be written to another file. The output file will also include a summary of the data processed. You must use at least one dialog box in this program.
The data for each triangle will be on a separate line of the input file, with the input data echoed and the results referred to by the line number (see example).
Some things to note:
• All input data lines must be processed.
• A new line with triangle data always starts with the ‘#’ marker.
• If an error is encountered on a given line, it must be handled. Afterwards, the program will continue on the next line without processing the triangle. An example of such an error is a non-integer appearing in the first three values of a given line.
• Extraneous data must be discarded. This is data that appears after the first three triangle sides are found, but before a new triangle marker is found.
• If the end of file (EOF) is found, a message should be printed out
• There shall be no unhandled file related exceptions and an end-of-file exception must be avoided.
On initialization, the program will prompt the user for both an input and an output file. If a non-existent input file is specified, the appropriate exception must be handled, resulting in an error message. For the exception case, re-prompt the user for the correct input file [Extra credit if you implement a JFileChooser type dialog box]. Once the I/O file is specified, the program will read in and process all the entries in the file. The output of the program will be written to the specified output file and echoed to the console.
The program will evaluate each line and determine the validity of the triangle. If valid, the program will output summary line for the triangle calculation (see Programming Assignment #2A). If invalid, the program will output a description of the error found in the entry. Your program must be robust and handle situations where all the triangle inputs are not proper and/or present.
Once all the entries are processed, a summary will be generated providing the following information:
• Pathname of the input file
• Number of lines processed
• Number of valid triangles
• Number of invalid triangles
You should be able to reuse much of your Programming Assignment #2A code for this project. However, strongly recommend that you rewrite your code and put this functionality in separate method(s). Likewise, any residual problems from #2A should be fixed in this version. The main features you will be adding are:
• Multiple methods
• Exception handing
• File I/O
• Dialog box
public class GeometricObject {
private String color = " white ";
private boolean filled;
private java.util.Date dateCreated;
public GeometricObject() {
dateCreated = new java.util.Date();
}
public GeometricObject(String color, boolean filled) {
dateCreated = new java.util.Date();
this.color = color;
this.filled = filled;
}
public String getColor() {
return color;
}
public void setColor(String color) {
this.color = color;
}
public boolean isFilled() {
return filled;
}
public void setFilled(boolean filled) {
this.filled = filled;
}
public java.util.Date getDateCreated() {
return dateCreated;
}
public String toString() {
return "Created on " + dateCreated + "\n color: " + color + " and filled ";
}
}
Susan performs a full backup of her server every Sunday at 1:00 a.m. and differential backups on Mondays through Fridays at 1:00 a.m. Her server fails at 9:00 a.m. on Wednesday. How many backups does Susan need to restore
The number of files Susan needs to restore is three because she has full backup and the three files have crashed.
What is differential backup?The most recent, previous complete data backup is used to create a differential backup. Only the data that has changed since the last full backup is captured in a differential backup. The basis of the differential is the full backup that a differential backup is based on.
Susan performs a full backup of her server every Sunday at 1:00 a.m. and differential backups on Mondays through Fridays at 1:00 a.m.
The server crashed on Wednesday at 9:00 am.
Since the Susan has full backup of her data which she did on Sunday at 1:00 am
Differential backups on Monday through Fridays at 1:00 a.m
So the number of files Susan needs to back up is three because the backup file which is taken on Wednesday at 1:00 am has also failed.
Thus, the number of files Susan needs to restore is three because she has full backup and the three files have crashed.
Learn more about the differential backup here:
https://brainly.com/question/14017082
#SPJ1
What does a file extension tell your computer?.
What was the name of the program that helped to develop a lot of the technology for the apollo program?.
Answer:
Gemini Program
Explanation:
In conjunction with the Apollo program the US launched the Gemini program which would develop technology for use on the Apollo spacecraft. Under the Gemini program the Americans learned how to change the orbit of a spacecraft, spent significant time in orbit to learn how the human body would be affected, brought two spacecraft together in a rendezvous in space, and also went on the first space walks outside of a space craft.
A form of wireless transmission called _____ is very popular for short-distance wireless communication that does not require high power
Answer: Wi-Fi
Wi-Fi doesn’t use that much power and is very popular form of wireless communication. But this could also be Bluetooth because it is also a tarnsmission that occurs wirelessly.
Select the correct answer.
Leonardo is a student. He is preparing to post his profile on a professional networking website. Which strategy will be most helpful in building
his brand?
OA. talking about his family and friends
OB. mentioning his networking contacts
OC. highlighting his skills and achievements
OD. making remarks about his teachers
OE emphasizing his areas of interest
Which data type does not allow duplicate values-python
A dictionary
B set
C tuple
D list
Answer:
Set
Explanation:
A set is unique in Python. It does not allow duplicates
Name various input and output devices used with computers.
Answer:
Input: Keyboard, Mouse, Microphone, Gaming Controller
Output: Monitor, TV, Headphones, Speakers
Explanation:
Input Devices are used to send signals to the computer.
Output Devices use signals from the computer to give you information
Next
Submit Test
Web Design and Development Tools: Mastery Test
Drag each tile to the correct box
Match the DHTML component to its description
scripting language
markup language
document object model
text stylesheet language
HTML
JavaScript
CSS
DOM
Answer:
script=java
makeup=Html
css=text
dom=document
Explanation:
Answer:
greatness0003- is correct
I hope this helps
BTW Plato
(proof)
The ownership of digtal assets in the emerging metaverse is being driven by what technology that enable the ownership of digital assets, such as gucci digital sneaker?.
The ownership of digital assets in the emerging metaverse is being driven by Blockchain.
What are digital assets?Digital asset is known to be any item that can be saved digitally and its specifically recognized that firm that can use or realize its value. Examples are documents, audio, etc.
Conclusively, The ownership of digital assets in the emerging metaverse is being driven by Blockchain as it helps to save plenty of its data.
Learn more about digital assets from
https://brainly.com/question/5679893
#SPJ1
A site has been issued the IP address of 192. 168. 10. 0/24. The largest network contained 25 hosts and was given the lowest numbered network number possible. What network number and mask will be assigned
Answer:
Explanation: The first thing to calculate is what IP addresses are used by the largest LAN. Because the LAN has 100 hosts, 7 bits must be left for host bits.
Explanation:
Explanation: The first thing to calculate is what IP addresses are used by the largest LAN. Because the LAN has 100 hosts, 7 bits must be left for host bits.
Create a class called payroll. instance variables are the name of the employee, the hours person worked and the hourly rate. make sure to include try-catch for the constructor, getter, setter methods. when creating an object, the name cannot be empty string, hours worked cannot be negative and cannot be greater than 56 hours. the hourly rate cannot be negative. also include a method called raise that increase the employee hourly rate. the raise cannot be negative. must use try catch
So creating code a class called payroll. and complementing with the information given in the edict, found that it will be:
Writing code in JAVA:import java.util.Scanner;
public class payroll
{
String name;
double salary;
double da;
double hra;
double pf;
double grossSal;
double netSal;
public Pay(String n, double s) {
name = n;
salary = s;
da = 0;
hra = 0;
pf = 0;
grossSal = 0;
netSal = 0;
}
void calculate() {
da = salary * 15.0 / 100;
hra = salary * 10.0 / 100;
pf = salary * 12.0 / 100;
grossSal = salary + da + hra;
netSal = grossSal - pf;
}
void display() {
System.out.println("Employee Name: " + name);
System.out.println("Salary: " + salary);
System.out.println("Dearness Allowance: " + da);
System.out.println("House Rent Allowance: " + hra);
System.out.println("Provident Fund: " + pf);
System.out.println("Gross Salary: " + grossSal);
System.out.println("Net Salary: " + netSal);
}
public static void main(String args[]) {
Scanner in = new Scanner(System.in);
System.out.print("Enter Employee Name: ");
String empName = in.nextLine();
System.out.print("Enter Salary: ");
double empSal = in.nextDouble();
payroll = new Pay(empName, empSal);
obj.calculate();
obj.display();
}
}
See more about JAVA code at brainly.com/question/12975450
#SPJ1
The data "10/24/2012" is an example of a ______________ type.
A. string
B. integer
C. boolean
D. float
Answer:
option B is correct answer
The for loop is a count-controlled loop and is used to execute a loop body a predictable number of times.
A. True
B. False
Answer:
True
Explanation:
For loops:
//This is Java code
for (int i = 0; i < 10; i++)
{
System.out.println("hi");
}
They let you specify the number of times the code inside the loop will execute. Above, it would print "hi" 10 times.
Answer:
true
Explanation:
have a nice day and hope it helps
The range of an area where users can access the Internet via high-frequency radio signals transmitting an Internet signal from a wireless router is known as a _____.
Answer:
A hot spot
Explanation:
Q:
The range of an area where users can access the Internet via high frequency radio signals transmitting an Internet signal from a wireless router is known as a _____. A) HotspotB) PAN…
A:
A) hotspot Bluetooth is for short distance and pan is Personal area networks (PANs) connect an individual's personal devices
If an array is sorted from lowest to highest, then the smallest item will always display in the first element of the list / array and the largest item will display in the last element of the array.
A. True
B. False
________ are not used for querying and analyzing data stored in data warehouses. Group of answer choices Word processing programs OLAP tools MOLAP tools Dashboard tools
Answer:
Word processing programs
Explanation:
Q:
________ are not used for querying and analyzing data stored in data warehouses.
A:
Word processing programs
Complete each sentence.
the first part of step 1 involves clicking___
.
an option for step 3 is___ a rule.
the two options identified in step 12 can both be found in the___group under the home tab.
The first part of step 1 involves clicking styles, edit, editing. An option for step 3 is edit a rule. The two options identified in step 12 can both be found in the editing group.
What is Editing?Editing is the act of selecting and making changes, any kind of material.
Note that in the above, The first part of step 1 involves clicking styles, edit, editing. An option for step 3 is edit a rule. The two options identified in step 12 can both be found in the editing group.
Learn more about Computer Applications from
https://brainly.com/question/24264599
#SPJ1
a variable can be __ inside a program
Answer:
A function is a group of statements that exist within a program for the purpose of performing a specific task.Explanation:
Write A Code In Python
Code should be able to
- Save Usernames and Passwords that are entered
- Be able to login to an account when username or password is entered
- Allow Only 3 Log In Attempts
Answer:
Here is my code below: username = 'Polly1220' password = 'Bob' userInput = input("What is your username?\ n") if userInput == username: a=input("Password?\ n") if a == password: print("Welcome!") else: print("That is the wrong password.") else: print("That is the wrong username.")
Answer:
print('Enter correct username and password combo to continue')
count=0
while count < 3:
username = input('Enter username: ')
password = input('Enter password: ')
if password=='Hytu76E' and username=='bank_admin':
print('Access granted')
break
else:
print('Access denied. Try again.')
count += 1
Select the correct answer.
Which task is a part of the analysis phase of the SDLC?
A.
installation
B.
coding
C.
planning
D.
testing
Answer: C. planning
Explanation:
should every presentation have a beggening middle and end
Answer:
yes every presentation should have a beginning middle & end.
Explanation:
you should include these 5 parts
- introduction
- objective
- overview
- presentation
- summary/conclusion
what is the name of the virus that appears to be a legitimate program but when opened, it can steal passwords or destroy data?
Answer: A Trojan Horse
Explanation: The name is based on the famous legend, where an army was granted access under the guise of being a safe and trustworthy entity.