Which function prompts the user to enter information?

def main()
input()
int()
main()

Answers

Answer 1

Answer:

B. input()

Explanation:

Hope this helps :)

Answer 2

Answer:

Input()

Explanation:

So if you used process of elimination, you can see that def main() defines the start of the program and main() defines the end of the program. Also, int() is to solve without a decimal or special marking, therefore, input() would be the only reliable answer.

~i also got this correct on the test!~


Related Questions

When programming, the word "execute" means which of these?
to kill
to edit
to run
to revise

Answers

Answer:

to run!

Explanation:

hope this is helpful!

In Word, blue underlining indicates which of these problems?
A grammatical error
B file error
C spelling error
D style mismatch

Answers

Answer:

The blue indicates a grammatical error, including misused words.

Hence, the answer is A

Give 2 bennifits of expert system

Answers

Answer:

Provide answers for decisions, processes and tasks that are repetitive.

Hold huge amounts of information.

Minimize employee training costs.

Centralize the decision making process.

Make things more efficient by reducing the time needed to solve problems.

here are a few

hope it helps : )

What is the name for the strip of frequently used icons on a computer? O App O Program O Toolbar O Utilities panel ILL MARK YOU BRAINEST​

Answers

Answer: The name of the strip is the Toolbar.

Answer:

its quite obvious toolbar

Explanation:

3.3 Code Practice: Question 1
Instructions

Test if a date is a payday based on the day of the month (15th or the 30th).
Sample Run

Enter today's day numerically: 17
Sorry, not a payday.
Enter today's day numerically: 30
It's payday!

please help in python!

Answers

Answer:

date = int(input("Enter today's day numerically: "))

if date == 15 :

 print("It's payday!")

elif date == 30 :

 print("It's payday!")

else:

 print("Sorry, not a payday.");

Explanation:

The program illustrates the use of if-conditions

The program in Python where comments are used to explain each line is as follows:

#This gets integer input for day

day = int(input("Enter today's day numerically: "))

#This checks if day is 50 or 30

if day == 15 or day == 30:

   #If yes, this prints payday

   print("It's payday!")

#If otherwise

else:

   #If otherwise, this prints not a payday

   print("Sorry, not a payday.")

At the end of the program, the program outputs payday or not a payday; depending on the input from the user

See attachment for sample run

Read more about Python programs at:

https://brainly.com/question/22841107

Hands-On Project 15-4 Make Network Cables
Using the tools and skills you learned about in this chapter, practice making a straight-through cable and a crossover cable. Use a cable tester to test both cables. Answer the following questions:
1. Which wiring standard did you use for the straight-through cable? List the pinouts (pin number and wire color) for each of the eight pins on each connector.
2. Will your crossover cable work on a Gigabit Ethernet network? List the pinouts (pin number and wire color) for each of the eight pins on each connector.

Answers

Answer:

1. You can use either standard (T-568A or T-568B) - but must keep the standard throughout the installation (can't mix A with B).

The B standard is preferred in the US.  A is mostly used overseas (Europe)

For A the proper wiring sequence is:

1 - Orange/White

2 - Orange

3 - Green / White

4 - Blue

5 - Blue / White

6 - Green

7 - Brown / White

8 - Brown

2. Cross over connections use a different pinout for one side of the cable.  The second side is wired normally.

Crossover connections are only used for device to device connections.  ( as in the case of connecting two NIC cards together directly).  They will not work if plugged into a switch or other network device.

Normal side - use the pinout from question #1

Crossover side:

1 Green / White

2 Green

3 Orange / White

4 Brown / White

5 Brown

6 Orange

7 Blue

8 Blue / White

Explanation:

What was the biggest problem with the earliest version of the internet in the late 1960’s?

Answers

Answer:

Explanation:

1.security issue

2. Computers were too big

3. Not very reliable

4. Networks couldn't talk to each other

5. Only be used in universities, governments, and businesses

INTERNET SAFETY RULES

Answers

Do you need help with basic Internet safety? i’ll help you in the comments if that’s what you need?

Answer:

1. Keep Personal Information Professional and Limited

2. Keep Your Privacy Settings On

3. Practice Safe Browsing

4. Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection

5. Be Careful What You Download

6. Choose Strong Passwords

7. Make Online Purchases From Secure Sites

8. Be Careful What You Post

9. Be Careful Who You Meet Online

10. Keep Your Antivirus Program Up To Date

Which design principle involves mentally dividing up an image with two horizontal lines and two vertical lines

Answers

Answer:

the answer is Rule of thirds

Rule of thirds involves mentally dividing up an image with two horizontal lines and two vertical lines

The rule of thirds is a creation decide that places the subject in the left or right third of an image, leaving the other 66% more open. While there are various sorts of synthesis, the norm of thirds all around prompts persuading and particularly made shots. The Rule of Thirds puts your subject on the left-third or right-third of the edge, making a delightful synthesis.

Rule of thirds involves mentally dividing up an image with two horizontal lines and two vertical lines.

For more information:

https://brainly.com/question/18964599?referrer=searchResults

What were the first computers made

Answers

Answer:

In 1943 he ENIAC computing system was built by John Mauchly and J. Presper Eckert

Explanation:

Answer:

ENIAC (Electronic Numerical Integrator and Computer)

There’s a scientific theory out there that says that our brain uses an algorithm to create our thoughts and it’s called the Theory of Connectivity. This theory suggests that information comes into our brains, is processed, stored, and then results in an output. Does this process sound familiar to you? In what ways do our bodies take in input and respond, sometimes without our control? Give two examples

Answers

Answer:

1. Yes, the process sounds familiar to me. It looks like the mechanism of operation of the computer.

2a. Through reflex actions, our bodies take in input and respond sometimes without our control.

b. Two examples are sneezing and the scratch reflex.

Explanation:

The principle of the theory of connectivity which involves the input, processing, storage, and output of results is similar to the workings of the human body which has to accept input from the external surroundings which it processes and provides an output for. Reflex actions are involuntary actions made in response to a stimulus. When the body receives the input, the response is made most times before we are aware of it.

Scratch reflex occurs when the sensory neurons located on the periphery of our skins are activated due to stimuli that could be in the form of touch, an insect bite, etc. Sneezing is another example of a reflex action.          

Answer:

The process does sound familiar to me; it is like the mechanism of operation of the computer. Through reflex actions, our bodies take in input and respond sometimes without our control, such as shivering, blinking, and sneezing.

Explanation:

____ is NOT an effective way to do research about a job you want.

Answers

Answer:

I would say that asking your friends is probably not a good way to research for a job.

Explanation:

It would definitely be helpful to talk to someone who already works at the job you want. Researching the company or job online is a good way to learn about them. And a guidance counselor can usually help point you in the right direction of what you'd like to know.

What does the measurement tell you?

Estimate at completion

Answers

Answer:

forecasted cost of the project, as the project progresses/"The expected total cost of completing all work expressed as the sum of the actual cost to date and the estimate to complete." - PMBOK Guide

Explanation:

Measurement tells u the accurate measure of something

What is a class in CSS?
A.a grouping of HTML tags for which style properties can be declared
B.a selector used to define a unique style
C.a tag used to apply styles to a block of content
D.the part of a declaration describing the type of style to be applied

Answers

I think is B not positively sure tho

Answer:

A grouping of HTML tags for which style properties can be declared

Explanation:

CORRECT

Difference between entropy and enthalpy is

Answers

Answer:

Explanation:

Enthalpy is the measure of total heat present in the thermodynamic system where the pressure is constant. Entropy is the measure of disorder in a thermodynamic system.

Is a i5 2400 and a GeForce GTX 1060 6GB bottlenecking?

Answers

Answer:

In terms of memory, the GTX 1060 6GB 's 6144 MB RAM is more than enough for modern games and should not cause any bottlenecks. This combination between GTX 1060 6GB and Intel Core i5-2400  3.10GHz has less than 15% bottleneck in many games and can cause minor FPS loss.

Explanation:

i wish i had one of these lol

Answer:

Yes very Much

Explanation:

Please No

what is an operating system​

Answers

Answer:

Explanation:

Online Dictionary defines 'Operating System' as "the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.''

Hope this helps!

When collecting digital evidence from a crime scene, often the best strategy for dealing with a computer that is powered on is to:

Answers

Options:

a. remove the hard drive

b. transport it while running

c. perform a clean shutdown

d. unplug it

Answer:

d. unplug it

Explanation:

Indeed, unplugging the computer often the best strategy for dealing with a computer that is powered on so to preserve (or collect) digital evidence. By so doing it allows the investigator to safely check through the computer found at the crime scene.

However, if the investigator decides to remove the hard drive or performing a clean shutdown, valuable evidence may be lost as a result. Also, transporting it while running isn't going to be a viable option.

Write an expression using Boolean operators that prints "Special number" if special_num is -99, 0, or 44.

Sample output with input: 17
Not special number

Answers

Answer:

special_num = int(input())

if  special_num == -99 or special_num == 0 or special_num == 44:

   print('Special number')

else:

   print('Not special number')

Explanation:

#get input

special_num = int(input())

#if function to evaluate true or false(aka Boolean)

if  special_num == -99 or special_num == 0 or special_num == 44:

#true evaluation

print('Special number')

#false evaluation

print('Not special number')

The program evaluates the number inputted by a user, checks if it is one of three special numbers and displays the appropriate message. The program is written in python 3 ;

special_num = int(input('enter number : '))

#allows user to input an integer value which is assigned to the variable named special number

if(special_num == -99) or (special_num ==0) or (special_num == 44):

#checks if the inputted value is one of the three special numbers using the assignment operator '==' and 'OR'

print('special number')

# if the condition evaluates to true, display the message ;special number

else :

print('Not a special number')

#if otherwise, display the message, not a special number.

Learn more :https://brainly.com/question/18929518

It is common practice not to store user’s password in clear text. However, if an attacker has seized control of the password database, he is likely already capable of modifying any user data on the site as an administrator. Why bother hashing the passwords then?

Answers

Answer:

To prevent leakage of user's passwords.

Explanation:

I don't really know the premise of your question, but I assume it is this. If the hacker has access to the user's data, they may have the email address. If they cannot crack the password hash, then they may not attempt to login to the user's accounts on other websites.

Given storeMonthlySales NUM STOREST[NUM MONTHST[NUM DEPTS] is a three-dimensional array of floating point values. Write a C++ function, printMonthlySales, to calculate and print the total value of sales during a specific month by each department and in each store plus totals by store and department and overall sales. The return type of the function is void and the function must have 2 input parameters Sales array and the month the user specified (edit for correct month values!). The constants NUM STORES, NUM_MONTHS, and NUM_DEPTS must be accessed globally by defining the following global variables #define NUM DEPTS 2 #define NUM STORES 2 #define NUM-MONTHS 12 or const int NUM-MONTHS-12; or const in NUM_DEPTS 2; or const int NUM_STORES 2; The array Sales is initialized by the following statement within main() float storeMonthlySales[NUM STOREST[NUM MONTHS1[NUM DEPTS]- 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 2.9, 3.0, 3.1,3.2, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.9, 4.0, 4.1, 4.2, 2.1, 2.2,2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 2.9, 3.0, 3.1, 3.2 Output: Sales for month of value (where value represents "January", "March", etc.) Dept # value value col value sum Dept # Store Total Store # value row value sum tore # value row value sum Dept Total col value sum total overall sales User enters a new month as many times as they wish and run printMonthlySales against the new month alue Validate user input ("y" or "n") when asking if the user wants to enter a new set of values

Answers

Answer:

Y

Explanation:

YEZ

Write two statements that each use malloc to allocate an int location for each pointer. Sample output for given program:

Answers

Answer:

In the following code, you can see the usage of malloc.

#include <stdio.h>

#include <stdlib.h>

int main(void) {

  int* numberPointer1 = NULL;

  int* numberPointer2 = NULL;

  numberPointer1 = (int *)malloc(sizeof(int *));

  numberPointer2 = (int *)malloc(sizeof(int *));

  *numberPointer1 = 44;

  *numberPointer2 = 99;

  printf("numberPointer1 = %d, numberPointer2 = %d\n", *numberPointer1, *numberPointer2);

  free(numberPointer1);

  free(numberPointer2);

  return 0;

}

Explanation:

Malloc allocates memory in the heap according to the input size and returns a pointer to the location where it was allocated, with an extra, it clears all allocated space.

how do i chose the brianliest answer

Answers

Answer:

you can choose the brainliest answer by clicking in a brainliest answer

Answer:

Click on the answer, then click brainliest

Explanation:

Bernie is an aspiring video game developer. Learning which of the following software would benefit him the most?

A. Computer-aided design software

B. Sampling software

C. 3-D animation software

D. System software

Answers

Answer:System Software

Explanation:

3-D animation software is for 3d animation

Sampling software is for audio

Computer aided design is an artistic media

A video game developer is is a software developer and is specialized in video game development. It relates to the creation of video games. The video game publisher have maintained a studio. And it involves 3rd party developer.

For making the games he needs 3D animated software such as shade 3D or K-3D. In order to make the game he needs to have all automation software that provides him the visual effects.

Hence the option C is correct.

Learn more about the aspiring video game developer.

brainly.com/question/21539732.

What is the result when you run the following line of code after a prompt >>>print(“2+4)

Answers

Answer:

2+4

or more honestly, it would return an error message.

Explanation:

So none of the answers are correct because:

no quotes will be printed.If you look more closely, the quotes are inversed in the statement, which is invalid syntax.

see picture

Answer:

the answer is

'2 + 4'

Explanation:  

I just took the test, so I know for 100% certainty, that this is the answer that is being accepted as the correct answer.  

Compare a Wi-Fi hotspot with a cybercafé.

Answers

Answer:

A WiFi Hotspot is a wireless internet connection that allows a computer, smartphone, or any other internet-enabled devices to connect to internet access points.

A cybercafe refers to any business place that allows people to access the internet usually within its premises after paying for connection access to connect to it.

Explanation:

TCP is a more dependable protocol than UDP because TCP is_____ latent/connectionless/connection-oriented/encapsulated

Answers

Answer:

connection-oriented

Explanation:

Answer:

TCP is a more dependable protocol than UDP because TCP is

connection-oriented

Explanation:

Because I took a guess and that was the  

How can you crop a photo in PowerPoint?

Answers

Answer:

Yea

Explanation:

jus click on the image and it should give you the option to crop it :)

Yes by clicking on the picture and selecting crop image

Which of these statements are true? A. You can select all the items in the section of the menu. B. In the center section of the menu only one item can be selected at a time. C. Details is selected. D. Thumbnails, tiles, icons, and list are selected.

Answers

Answer:

In the center section of the menu, only one item can be selected at a time.

Details is selected

Explanation:

which team member on a project typically enjoys solving difficult problems? ILL MARK BRAINEST​

Answers

Answer: the programmer.

Explanation: I did the test you used the picture on

Answer:

whats THE ANSWER IS HER WRONG

Explanation:

Other Questions
What is the slope of the line that passes through points (-6,-7) and (-24,-7) . Write your answer in the simplest form HELP ASAPThe scale on a map shows that 2 inches represents 15 miles. Which proportion can be used to find the actual distance,X, represented by 30 inches on the map?2 30152 X15301520 3015 X302 Help ! Whats the answer? what is the answer? pls help Many plants are poisonous because their stems and leaves contain oxalic acid, H2C2O4, or sodium oxalate, Na2C2O4. When ingested, these substances cause swelling of the respiratory tract and suffocation. A standard analysis for determining the amount of oxalate ion, C2O 2 4 , in a sample is to precipitate this species as calcium oxalate, which is insoluble in water. Write the net ionic equation for the reaction between sodium oxalate and calcium chloride, CaCl2, in aqueous solution. Please help me with math Write the values of the 9s in 990.250. How are the values related? who are the characters in chapter 7 hunger games book 1 If Match these terms with their definitions. theocracy a process of preserving a body to prevent decay afterlife a monument used by scientists to decipher the meaning of hieroglyphics life after death Rosetta stone government in which the political leader is also a religious leader mummification the Egyptian system of writing that is based on picture symbols. hieroglyphics Why was the stamp act taxing all the people? The Frosty Ice-Cream Shop sells sundaes for $4 and banana splits for $6. On a hot summer day, the shop sold 8 more sundaes than banana splits and made $182. How many sundaes did they sell? Compound X has the formula C8H12. X reacts with two molar equivalents of hydrogen in the presence of a palladium catalyst to form cyclooctane. Treatment of X with ozone followed by zinc in aqueous acid gives two molar equivalents of the same dialdehyde. What is the structure of X Enter your responses in the blank.T= 2x + 3y - 2 ____=3y- 2x = 3y - 2 ____ = y HELP PLEASE HAVING BAD DAYJasmine drives every morning to her office that is 12 miles from her home.If Jasmine's average driving speed is s mph, how many hours does it take her to drive from her home to the office? THIS WAS THE ONE I MEANT TO POSTFind the number of ways four out of nine patients can be chosen to complete a survey a. a lipid moleculeb. an indicator c. an ADP moleculed. an enzyme Please i really need help Little Billy lay down in his racecar shaped bed and tried to sleep.Suddenly, the shutters of his window began to rattle and the knob ofhis bedroom door started twitching, Billy sat up. The door flew openand the ghost of the house's previous owner floated in his clothing inrage, his face covered in scars, his shoulders hunched from the manychains draped over his torso. I must have vengeancel the ghostdeclared"Well, go have vengeance somewhere else tonight," said Billy, as hesighed. I have school tomorrow." He plopped back down, covered up,and went to sleepWhich statement best explains how the plot of the story helps develop themain character?A. Billy's return to sleep shows that he is severely overtiredB. Billy's response to the ghost shows that he is not easily frightenedC. The ghost's search for vengeance shows that he is Billy's enemyD. The ghost's return to the house shows that he has angerproblems URGENT again having difficulty, please answer as soon as possible would be appreciate it :)