19.) Write a C++ program that requests five integer values from the user. If any of the values entered are duplicates, it prints "DUPLICATES"; otherwise, it prints "ALL UNIQUE".​

Answers

Answer 1

Answer:

#include <iostream>

#include <vector>

#include <algorithm>

using namespace std;

int main() {

 vector<int> v;

 int value;

 bool hasDuplicates = false;

 for(int i=1; i<=5; i++) {

   cout << "Enter number " << i << ": ";

   cin >> value;

   hasDuplicates |= find(v.begin(), v.end(), value) != v.end();

   v.push_back(value);      

 }

 cout << (hasDuplicates ? "DUPLICATES" : "ALL UNIQUE") << endl;

}

Explanation:

If you can make your program simpler by using STL (i.e., the vector template), do it.


Related Questions

Question 1 The Movie class includes a toString method. Suppose another class is using the Movie class and has declared m as a Movie and initialized m. Which TWO of the following would use the toString method correctly to print out information about the movie m? 1 point 1 System.out.println(m); 1 System.out.println(toString()); 1 System.out.println(m.toString); 1

Answers

The two print statement which would use the toString method correctly to print out information about the movie m are:

System.out.println(toString()); 1.System.out.println(m.toString()); 1.

What is a method?

In Computer programming, a method can be defined as a block of executable code (sets of instruction) that are written and used by programmers to break down a given problem into small but manageable fragments (pieces).

This ultimately implies that, methods are typically written and used by programmers to break down any complex problem into simple and manageable fragments (pieces) such as in modern programming languages, which comprises several predefined methods.

In conclusion, the "System.out.println(toString());1" and "System.out.println(m.toString()); 1" calls the toString() function which then returns the string representation of the object movie.

Read more on print methods here: https://brainly.com/question/19594241

#SPJ1

A desktop is one kind of computer. Name two other kinds?​

Answers

Answer:

Notebook, supercomputer.

Explanation:

Notebooks are laptops, usually low performance.

Supercomputers are the best performing computers in the world.

Answer:

super computers and mainframe computers

Explanation:

these computers were used way before desktop computers

many people are now using the web not simply to download content, but to build communities and upload and share content they have created. this trend has been given the name

Answers

The term "Web 1.0" describes the early development of the World Wide Web. In Web 1.0, the vast majority of users were content consumers and there were very few content creators.

Personal websites were widespread and mostly included static pages maintained on free web hosts or web servers controlled by ISPs.

Web 1.0 forbids the viewing of ads while browsing websites. Ofoto, another online digital photography websites from Web 1.0, allowed users to store, share, view, and print digital images. Web 1.0 is a content delivery network (CDN) that allows websites to present the information. One can use it as their own personal webpage.

The user is charged for each page they see. Users can access certain pieces of information from its directories. Web 1.0 was prevalent from around 1991 until 2004.

Four Web 1.0 design requirements are as follows:

1.static web pages

2.The server's file system is used to serve content.

3.Pages created with the Common Gateway Interface or Server Side Includes (CGI).

4.The items on a page are positioned and aligned using frames and tables.

To know more about Web 1.0 click on the link:

https://brainly.com/question/14411903

#SPJ4

Define a function FindSmallestVal() with no parameters that reads integers from input until a positive integer is read. The function returns the lowest of the integers read.
Ex: If the input is -35 -80 -75 25, then the output is:
-80
Note: Positive numbers are greater than 0.

Answers

A function, according to a technical definition, is a relationship between a set of inputs and a set of potential outputs, where each input is connected to precisely one output.

A method with a return value is called a function. Set the return type of a method to the type of the value it is returning to define the method as a function. Math is an illustration of a built-in function in Java. pow() Java only requires the method name, two parentheses (), and a semicolon to invoke a method (;). If the method's declaration has parameters, the parameters are given in between parentheses () without their datatypes being stated.

Learn more about function here-

https://brainly.com/question/28939774

#SPJ4

Create a list of 5 characters from your favorite game. Ask the user to enter their favorite character's name. If it is not present in the list tell the user that This character is not present in my list of favorites and ask the user whether they would like to add it. If the user says Yes, show them the list and ask at which position they would like to add it. Add the character's name at the respective position. If they would not like to add it then print Thank You for telling me your favorite character. If the name already exists then display a message saying Yay, one of our favorite character match.

this is a python question. So copy-paste your answer directly from the python app.
If you give me a good answer, you'll get 100 points :)

Answers

Answer:

# List of favorite characters

favorite_characters = ['Mario', 'Link', 'Donkey Kong', 'Samus', 'Yoshi']

# Ask user to enter their favorite character

fav_character = input("Enter your favorite character: ")

# Check if character is present in list

if fav_character in favorite_characters:

   print("Yay, one of our favorite characters match.")

else:

   add_char = input("This character is not present in my list of favorites. Would you like to add it? (Yes/No): ")

   if add_char.lower() == 'yes':

       print(favorite_characters)

       position = int(input("At which position would you like to add it? "))

       favorite_characters.insert(position-1, fav_character)

       print(f"{fav_character} added at position {position}.\nNew list of favorite characters: {favorite_characters}")

   else:

       print("Thank you for telling me your favorite character.")

Excel

Please explain why we use charts and what charts help us to identify.
Please explain why it is important to select the correct data when creating a chart.

Answers

1) We use chart for Visual representation, Data analysis, Effective communication and Decision-making.

2. It is important to select the correct data when creating a chart Accuracy, Credibility, Clarity and Relevance.

Why is necessary to select the correct data in chart creation?

Accuracy: Selecting the right data ensures that the chart accurately represents the information you want to convey. Incorrect data can lead to misleading or incorrect conclusions.

Relevance: Choosing the appropriate data ensures that your chart focuses on the relevant variables and relationships, making it more useful for analysis and decision-making.

Clarity: Including unnecessary or irrelevant data can clutter the chart and make it difficult to interpret. Selecting the correct data helps to maintain clarity and simplicity in the chart's presentation.

Credibility: Using accurate and relevant data in your charts helps to establish credibility and trust with your audience, as it demonstrates a thorough understanding of the subject matter and attention to detail.

Find more exercises related to charts;

https://brainly.com/question/26501836

#SPJ1

Plz help meeee

Erin would like to add a photo to a presentation. However, she only
has the printed copy of the photo. She does not have a digital copy.
What should Erin do?

Answers

Answer:

You didn't add any options, so I'll assume this is an open question.

Erin should scan the photo to a digital format using a digital scanner.

Hurry please help What, if anything, is wrong with the following comment block?
#
your name
the date
the purpose
#
There should be three repeated pound signs at the start and end: ###.
There should be three repeated quotation marks at the start and end: """.
There should be three repeated ampersand at the start and ends: &&&.
There is nothing wrong.

Answers

There is nothing wrong with the comment block as it does not contain any syntax errors.

What is a comment?

A comment is a line of code that is ignored by the Python interpreter. Comments are used to add descriptions or explanations of the code for human readers, without affecting the program's execution.

Comments are useful for making code more readable and maintainable, and for documenting the purpose and behavior of functions, classes, and modules. It's good practice to write clear, concise comments for your code, especially for complex or non-obvious logic.

To know about comments, visit:

https://brainly.com/question/30318947

#SPJ1

the capacity of your hand drive is measured in​

Answers

Answer: The amount of storage on a hard disk, measured in gigabytes and terabytes. Hard drive capacity is measured by the amount of data users need to store, which is often much greater than the space applications take up. For example, a single video can take four gigabytes of space.

Explanation: Wssup if this help u, hit me up. name lil nae

.Pretend you are ready to buy a new computer for personal use.First, take a look at ads from various magazines and newspapers and list terms you don’t quite understand. Look up these terms and give a brief written explanation. Decide what factors are important in your decision as to which computer to buy and list them. After you select the system you would like to buy, identify which terms refer to hardware and which refer to software.

Answers

Answer:

Brainly is not meant to give paragraph answers to large questions.

In a computer (desktop)

There are 8-9 main components to a PC

Motherboard

CPU

GPU (for gamers)

RAM

SSD

HDD

PSU

Cooling fans (for AMD processors stock fans are included)

Case (some fans included)

I personally build my computers (desktops) as its cheaper and I won't have to pay a build fee.

what is one commonality among all consumer services jobs

Answers

One commonality among all consumer services jobs is that they involve interacting with customers or clients in some way and providing them with assistance or support. This can include answering questions, addressing complaints, and helping customers navigate a product or service.

Explain basic anatomy of computers.

Answers

Explanation:

A computer system can be divided into two components which are responsible for providing the mechanisms to input and output data, to manipulate and process data, and to electronically control the various input, output, and their storage. ... They are known as hardware and software.

1. As the network administrator for a large healthcare facility, Jon understands the importance of securing his company's patient data. Jon recalls from his IT security college classes that the CIA Triad is a foundational IT security concept. He has been requested to meet with the IT Director to discuss potential security threats and wants to provide examples as how they relate to CIA.

For each of the following security examples, identify which CIA component is of greatest issue:

A dumpster diver retrieves a printout of patient names and associated personal and financial information.

A hacker accesses the healtcare facilities website and installs malware that modifies various webpages and alters contact information.

A cyberattacker gains access the the company's database server and installs malware that runs in the background and slows down workstation access to patient records.

An company employee is accidentally given permissions which allow them to delete files on a file server which they should not have had rights to delete.

A lower-level employee uses a higher-level employee's login account so they can assist a client with reviewing their medical records.

An under-trained employee, using their login account, accesses patient records which they are permitted to access, but inputs incorrect data.

2. Company X is review its IT security policies and procedures. In the policy there is a section dealing with "Access Controls". The policy review team (which includes several non-technical personnel) requests that an IT department representative provide insights into what should be covered by these policies and procedures.

Review the following items and determine which ones should be included in the IT department's representatives presentation.


Authentication protocols and processes


Passwords


Staff terminations


Tokens


Biometrics


Spam

3. Recognizing that many IT security attacks are software-based, Sarah, the CIO, of a small banking company is hiring an independent consulting firm to identify what countermeasures should be implemented to protect their computers and servers. The consulting firm has been requested to enumerate things that should be considered to reduce the probability and impacts of malicious software.

From the list of items below, identify those that would be malicious software countermeasures: (choose all that apply)


Anti-spam


Penetration testing


Firewalls


Anti-virus


Application whitelisting


Hardening

4. All companies need to be concerned about business continuity and disaster recovery planning. BCP and DRP are a complex activity that requires significant amounts of business resources. Once plans have been created, they need to be tested. A company would like to thoroughly test its BCP and DRP processes. It is planning to actually shutdown the production systems and/or process during the testing process.

What type of testing is being performed?




Cutover


Walkthrough


Parallel Test


Simulation


Document Reivew

5. One method of providing information/data security is encryption. Encryption methodologies can provide for confidentiality, integrity, and possibly even availability. What can encryption technologies provide to also ensure non-repudiation?


digital signature


key protection protocols


private-key


key exchange protocols


frequency analysis


public-key

Answers

Answer:

Confidentiality: A dumpster diver retrieves a printout of patient names and associated personal and financial information.

Integrity: A hacker accesses the healthcare facilities website and installs malware that modifies various webpages and alters contact information.

Availability: A cyberattacker gains access the company's database server and installs malware that runs in the background and slows down workstation access to patient records.

Confidentiality: An company employee is accidentally given permissions which allow them to delete files on a file server which they should not have had rights to delete.

Confidentiality: A lower-level employee uses a higher-level employee's login account so they can assist a client with reviewing their medical records.

Integrity: An under-trained employee, using their login account, accesses patient records which they are permitted to access, but inputs incorrect data.

Authentication protocols and processes

Passwords

Staff terminations

Tokens

Biometrics

Anti-spam

Firewalls

Anti-virus

Application whitelisting

Hardening

Simulation

Digital signature

Explanation:

Confidentiality: A dumpster diver recovers a printout with the names of patients and related financial and personal data.

What is Confidentiality?

Integrity: A hacker gains access to the hospital's website and sets up malware that modifies several webpages and changes the contact information.

Availability: A hacker infiltrates the company's database server and installs malware that slows down workstation access to patient records by running in the background.

Confidentiality: By mistake, a firm employee receives access to files on a file server that they should not have been able to remove.

Therefore, Confidentiality: A dumpster diver recovers a printout with the names of patients and related financial and personal data.

To learn more about Confidentiality, refer to the link:

https://brainly.com/question/15869788

#SPJ3

Which of the following statements should be avoided when developing a mission statement?
The how-to statements.

Describe the “who, what, and where” of the organization.

Be brief, but comprehensive.

Choose wording that is simple.

Answers

Answer: The how-to statements

Explanation:

The mission statement is simply a short summary of the purpose of a company. It is the guideline on how a company will operate. The mission statement states the reason for the existence of a company, products sold or service rendered and the company's goals.

The mission statement should be brief but comprehensive, consist of simple words and describe the “who, what, and where” of the organization.

Therefore, the incorrect option based on the explanation above is "The how-to statements". This shouldn't be part of the mission statement.

Write a program to read the the address of a person. The address consists of the following:

4 bytes street number

space

15 bytes street name

new line

11 bytes city

comma

space

2 bytes state

So the input could look like this:
Example: 1234 Los Angeles St.
Los Angeles, CA

Answers

This application presumes that the provided input format is precise (with a 4-digit street number, 15-byte street name, 11-byte city name, and 2-byte state abbreviation separated by spaces, new lines, and commas as specified).

How does BigQuery's Regexp replace work?

For instance, the result of SELECT REGEXP REPLACE("abc", "b(.)", "X1"); is aXc. Only non-overlapping matches are replaced using the REGEXP REPLACE function. As an illustration, substituting ana with banana only causes one replacement, not two. This function gives a false value if the regex parameter is an invalid regular expression. Additionally, it presumes that the input was typed accurately and without any mistakes or typos. You might want to add more validation and error-handling logic to a real-world application to make sure the input is accurate and complete.

# Read street address

street_address = input("Enter street address (4-digit street number, street name): ")

# Split the street address into street number and street name

street_number, street_name = street_address.split(' ', 1)

# Read city and state

city_state = input("Enter city and state (city, state abbreviation): ")

city, state = city_state.split(', ')

# Print the address

print(street_number)

print(street_name)

print(city)

print(state)

To know more about format visit:-

https://brainly.com/question/14725358

#SPJ1

19. What is the definition for the "Protection" mission area? A. Reduce loss of life and property by lessening the impact of disasters. B. Assist communities affected by an incident to recover effectively. C. Secure the homeland against terrorism and manmade or natural disasters. D. Avoid, prevent, or stop a threatened or actual act of terrorism.​

Answers

The definition for the "Protection" mission area is to avoid, prevent, or stop a threatened or actual act of terrorism.​ Option D

What is protection mission area?

The "Protection" mission area is a term used in the United States National Preparedness System to describe actions taken to secure the homeland against acts of terrorism and man-made or natural disasters.

This includes efforts to avoid, prevent, or stop threats of terrorism and to reduce the loss of life and property by lessening the impact of disasters.

Additionally, the Protection mission area aims to assist affected communities in recovering effectively from incidents.

Read more about protection mission area at: https://brainly.com/question/24851486

#SPJ1

9
of
Thich
the following Controls the process of
system? 6) User interface (b) Language Translator
c) platform (d) Screen Saver
teraction between​

Answers

Answer:

I'm sorry the answer is really difficult to understand, could you explain?

Explanation:

secret_num = 10 temp = secret_num + 8 #evaluate secret + 8, and put the result #in temp temp = temp * 2 #evaluate temp * 2, and put the results #in temp temp = temp / 4 answer = temp - secret_num / 2 print(answer)
why is the result always 4 ?why doesn't it change?​

Answers

The result will always be 4 because the first four lines of code gets a number \(k+4\), where \(k=\frac{\text{secret num}}{2}\), and the last line subtracts \(4\) from \(k+4\).. therefore leaving us with the value \(4\).

The effect of each line is explained below:

secret_num = 10

Assigns the value 10 to secret_num

temp = secret_num + 8

Stores the value 18 in temp

temp = temp * 2

Stores the value 36 in temp

temp = temp / 4

Stores the value 9 in temp

answer = temp - secret_num / 2

Stores the value 4 in answer

If the reasoning were done algebraically, we would have

\((((\text{secret num} + 8)\times 2)/4)-\text{secret num}/2\\\)

Where the bracket nesting reflects the sequence of operations that led to the final answer in the code

Writing it mathematically, and simplifying

\(\frac{2(\text{secret num} + 8)}{4}-\frac{\text{secret num}}{2}\\\\=\frac{2\times\text{secret num} + 16}{4}-\frac{\text{secret num}}{2}\\\\=\frac{\text{secret num}}{2}+4-\frac{\text{secret num}}{2}\\\\=\frac{\text{secret num}}{2}-\frac{\text{secret num}}{2}+4\\\\=4\)

We see that at the end, no matter what the value of secret_num was, the secret_num term still cancels out, leaving us with 4.

Learn more about Arithmetic operations here: https://brainly.com/question/5973382

Which of the following represents an input on a smartphone?
A pressing the volume key
B an appointment displayed by your calendar
C your phone ringing
D your screensaver turning on

Answers

Answer:

Pressing the volume key.

Explanation:

The appointment is and output. It is being shown to you from the smartphone.

The volume key is an input. Your telling the smartphone to raise its volume.

The phone ringing is also an output, and so is the screensaver turning on.

Answer:

A. Pressing the Volume Key

Hope this helped (~0>0)~

Set up a python program

Write a program to input the temperature every day for a certain number of weeks. The user will
input the number of weeks. You must use nested loops, otherwise there is no credit. Print the average
for each week when the input for the week is completed. Print the overall average at the end.

Answers

Answer:

Here is a sample program that does what you have described:

# Get the number of weeks from the user

weeks = int(input("Enter the number of weeks: "))

# Initialize variables to store the total temperature and number of days

total_temp = 0

total_days = 0

# Loop through each week

for week in range(weeks):

 # Get the number of days in the week from the user

 days = int(input("Enter the number of days in week {}: ".format(week + 1)))

 # Initialize a variable to store the weekly total temperature

 weekly_total_temp = 0

 # Loop through each day

 for day in range(days):

   # Get the temperature from the user

   temperature = float(input("Enter the temperature for day {}: ".format(day + 1)))

   # Add the temperature to the weekly total

   weekly_total_temp += temperature

 # Calculate the average temperature for the week

 weekly_avg = weekly_total_temp / days

 # Add the weekly total temperature to the overall total

 total_temp += weekly_total_temp

 # Add the number of days to the overall total

 total_days += days

 # Print the average temperature for the week

 print("The average temperature for week {} is {:.2f}".format(week + 1, weekly_avg))

# Calculate the overall average temperature

overall_avg = total_temp / total_days

# Print the overall average temperature

print("The overall average temperature is {:.2f}".format(overall_avg))

Explanation:

This program will ask the user to input the number of weeks, and then for each week, it will ask the user to input the number of days and the temperature for each day. It will then calculate and print the average temperature for each week, and finally calculate and print the overall average temperature.

I hope this helps! Let me know if you have any questions.

What are all the folders located on the DOCK called?

Answers

Answer:

Folders on the DOCK bar are called stacks

Use cin to read integers from input until 999 is read. For each remaining integer read before 999, if the integer is equal to 25, output "25 occurs" followed by a newline and increment numDetections.

Ex: If the input is 25 25 -6 25 25 999, then the output is:

25 occurs
25 occurs
25 occurs
25 occurs
4 time(s)

Answers

Ex: If the input is 25 25 -6 25 25 999, then the output is:4 time(s)

What is the code about?

By using a while loop in this code, we can utilize the cin function to retrieve integers from input until the sentinel value 999 is reached. We verify the equality of every integer read with the value of 25.

Therefore, We issue the statement "25 is present" and increase the numDetections count if applicable. After completion of integer reading, we display the overall count of occurrences of the value 25. It should be noted that we utilize "endl" to add a line break character at the end of every line of output.

Learn more about code  from

https://brainly.com/question/26134656

#SPJ1

Use cin to read integers from input until 999 is read. For each remaining integer read before 999, if

I would like assistance on writing a c++ program without using double. Thank you

I would like assistance on writing a c++ program without using double. Thank you
I would like assistance on writing a c++ program without using double. Thank you

Answers

Here is the corrected code:

function convertTime() {

let hours, minutes, ampm;

let military = prompt("Enter military time (hh:mm):");

// Verify input is a valid military time

if (!/^\d{2}:\d{2}$/.test(military)) {

  alert(military + " is not a valid time.");

  return;

}

// Parse hours and minutes

hours = parseInt(military.split(":")[0]);

minutes = parseInt(military.split(":")[1]);

// Convert to 12-hour format

if (hours == 0) {

  hours = 12;

  ampm = "AM";

} else if (hours < 12) {

  ampm = "AM";

} else if (hours == 12) {

  ampm = "PM";

} else {

  hours = hours - 12;

  ampm = "PM";

}

// Output the converted time

let standard = hours.toString().padStart(2, "0") + ":" + minutes.toString().padStart(2, "0") + " " + ampm;

alert("Standard time: " + standard);

// Ask if the user wants to convert another time

let repeat = prompt("Would you like to convert another time? (y/n)").toLowerCase();

if (repeat == "y") {

  convertTime();

}

}

convertTime();

You just figured out the root cause of an application error. You changed some configurations on the affected machines and verified that the users have full functionality. What should you do next?

Answers

After resolving the application error and verifying that users have full functionality,the next step   is to document the changes made and the steps taken to resolve the issue.

How is this so?

This documentation   is crucial for future reference, troubleshooting, and knowledge sharing within the team.

Also, it is important tocommunicate the resolution to the relevant stakeholders,such as users or supervisors, to ensure they are aware of the resolution and can provide f  eedback if necessary.

Learn more about application error at:

https://brainly.com/question/30062195

#SPJ1

Which of the following are examples of professional organizations in the field of IT? Check all of the boxes that apply.
the Association for Computing Machinery (ACM)
the Institute of Electrical and Electronics Engineers (IEEE)
the American Impressionist Society (AIS)
the American Society for Information Science and Technology (ASIS&T)

Answers

Answer:A,B,D

Just did the question

Explanation:

Answer:

1. Association for Computing Machinery (ACM).

2. Institute of Electrical and Electronics Engineers (IEEE).

4. American Society for Information Science and Technology (ASIS&T).

Explanation: This is the correct answer on Edge 2021, just did the assignment. Hope this helps ^-^.

Which of the following masks, when used as the only mask within a Class B network, wouldsupply enough subnet bits to support 100 subnets? (Choose two.)a. /24b. 255.255.255.252c. /20d. 255.255.252.0

Answers

Of the given options, both "/20" and "255.255.252.0" would supply enough subnet bits to support 100 subnets.

Why 255.255.252.0?

A Class B network has a default mask of 255.255.0.0, which provides 16 bits for the network ID and 16 bits for the host ID. To support 100 subnets, we need at least 7 subnet bits.

"/20" is written in CIDR notation, which represents the number of bits used for the network ID. A "/20" mask means that 20 bits are used for the network ID, which leaves 12 bits for the host ID and subnet ID.

"255.255.252.0" is written in decimal notation, which represents the value of each octet in the IP address. When converted to binary, this mask provides 22 bits for the network ID and 10 bits for the host ID.

Both "/20" and "255.255.252.0" provide enough subnet bits to support 100 subnets.

To know more about  Class B Network, Check out:

https://brainly.com/question/14914663

#SPJ4

.

What's wrong with my program? Here is my code , if the user wants a 3rd card dealt they, have to select yes and the total will be for 3 cards. If they don't, then the total is for 2 cards.? I also need to print the total for both the dealer and the user and determine the winner of the game?


# import random
import random
def main():
# greet the user
print("Hello! Welcome to my card game!")
# deal the user a random card between 1 and 10
num1 = random.randint(1,10)
print("You drew a", num1)
# deal the user another random card (between 1 and two)
num2 = random.randint(1,10)
print("You drew a", num2)
num3 = random.randint(1,10)

# deal the user a third card?
again = input("Would you like to draw a 3rd card? Y or N? ")
d_total = random.randint(10,21)
u_total = (num1) + (num2) + (num3)
u_total1 = (num1) + (num2)
if again == "Y" or "y":

print("You drew a", num3)


if (u_total > d_total) and (u_total < 21):
# the user wins
print("Congratulations! You won!")
print("You drew a",num1,",", "a",num2,"," "and a",num3, "for a total of",u_total)
if again == "N" or "n":
print("You drew a", num1,"and a",num2, "for a total of",u_total1)


if (u_total > d_total) and (u_total < 21):


print("The dealer's total is", d_total)




else:

print("Sorry! You lose.")

main()

Answers

Your issue is on line 19 in your if statement. In python, if you have more than one condition in an if statement, you have to explicitly mention it after the or.

Your if statement is

if again == "Y" or "y":

However, this will always return true because the second statement simply asks "y".

To correct this, simply change the if statement to:

if again == "Y" or again == "y":

This will correct your code.

Another thing to consider is to always convert a userinput (whenever possible) to one version, this can be accomplished in your code by converting "again" into one version by using the .lower function.

again = input("Would you like to draw a 3rd card? Y or N? ")

again = again.lower()

Hope this helps!

Acróstico sobre mouse

Answers

this is a PICTURE

i HOPE IT'S HELP
Acrstico sobre mouse

what is flow chart for which purpose flowchart is use in programmimg

Answers

A flowchart is a visual representation of a process or algorithm. It uses symbols and arrows to show the steps and the flow of the process. In programming, flowcharts are often used to design and document the logic of a program before it is written in code. They can help programmers visualize the structure of the program and identify potential problems or inefficiencies. Flowcharts can also be useful for explaining the logic of a program to others who may not be familiar with the code..

The Layout tab allows you to change the
A. Save
B. Print
C. Format,
D. Edit
........ formatting of??

Answers

The Layout tab allows you to edit  the formatting of a document.  (Option D)

How is this so?

It provides options for adjusting the layout and appearance of the content, such as page margins, page orientation, page size, columns, and other formatting elements.

This tab is commonly found in word processing software like Microsoft Word and provides users with the ability to customize the visual presentation and organization of their documents.

Thus it is correct to state that The Layout tab allows you to change the formatting of a document. (Option D)

Learn more about Layout tab at:

https://brainly.com/question/32342343

#SPJ1

Other Questions
when elizabeth wants to go out to dinner, she checks her open table app to see which restaurants in her area have reservations available. open table is an example of CSCI 1010 Assignment 6ArraysLearning OutcomesUse an array to store data.Process the contents of an array to determine simple statistical properties.Required ReadingSavitch - Sections 7.1-7.2InstructionsFor this assignment you will be writing a program that calculates information about a sequence of tracks on an album.Write a Java main class called YourlastnameProgram6.java (with your actual last name) that does the following:Displays a welcome message with your name in it.Prompts for and reads the lengths in minutes and seconds of 12 tracks of an album.Stores the length of each track in seconds in an array. (Note: total seconds can be computed by multiplying the minutes by 60 and adding the seconds.)Computes and displays the following:oThe shortest track on the album and its length.oThe longest track on the album and its length.oThe total running time of the entire album.oThe average length of a track on the album.In the output all times should be in the standard minutes and seconds format with a colon in between. This should be done by a private static void function in the main class with the following header:iv.static void displayTime(int totalSeconds)t.number of minutes can be calculated using the / and % operators. Note that if the number of seconds is less than 10, this function must display an extra zero after the colon. For example, a track with a total length of 185 seconds should have its length displayed as 3:05.Example Input and OutputWelcome to Nicholas Coleman's Album Length CalculatorPlease enter all track lengths in minutes and secondsseparated by a space.Track 1: 3 45Track 2: 2 3Track 3: 5 43Track 4: 6 12Track 5: 8 11Track 6: 3 24Track 7: 4 35Track 8: 3 12Track 9: 2 11Track 10: 7 13Track 11: 6 24Track 12: 5 14The shortest track is #2 at 2:03The longest track is #5 at 8:11The total length of the album is: 58:07The average length of a track is: 4:50 your sales manager has recently misplaced her mobile device that may contain sensitive information. what should she do first Which describes the polarity in a water molecule?O partial negative charge on the oxygen atom because its electrons are pulled toward the hydrogen atonO partial negative charge on the oxygen atom because it pulls electrons from the hydrogen atomsO partial positive charge on the oxygen atom because it pulls electrons from the hydrogen atomsO partial positive charge on the oxygen atom because its electrons are pulled toward the hydrogen atom What is 1 bar equal to in kPa? n choosing a career, your personal resources are defined as _____. a. the amount of money you require to accept the job when first hired b. who you are and what you have to offer an employer c. your career decisions and goals d. whether or not you have transportation to and from work Please select the best answer from the choices provided A B C D Can somebody help, please? le3. You should always check your fuel level before beginning a test drive.A) O TrueB) O False 74(9x + 11)7WHAT IS THE VALUE OF X?-79.4a-9.4b What is the common factor of 2x 3x 4? A favourable shock to aggregate demand (e.g., an increase in the global demand for NZ exports), ceteris paribus, will typically result in and while a favourable shock to short-run aggregate supply (e.g., a decline in world oil prices), ceteris paribus, will typically result in and .Group of answer choiceshigher prices; higher output; lower prices; higher outputhigher prices; higher output; lower prices; lower outputhigher prices; higher output; higher prices; higher outputlower prices; higher output; lower prices; higher output ........................... A frog leaps from flat ground at 6.32 m/sat a 36.3 angle. What maximum heightdoes it reach?(Unit = m) using the solubility rules, predict the products, balance the equation, and write the complte ionic and net ionic equatios for each of the following reactioins A bus travels a total of 350km in 4hours. What is its average speed?Enter a numberkm/h what is 9/16 x 2/3 (show ur work) Median of 81 94 83 91 What happens to the temperature of a substance while it is changing state?A. It increases first and then decreases.B. It decreases first and then remains constant.C. It varies randomly.D. It remains constant. An internet provider has been the only one available in the county for many years. A small startup has recently opened,offering customers internet at a much lower rate. The original internet provider buys the building that is being rented bythe startup and raises their rent to an unfair amount. This makes it impossible for the startup to stay in business. Ifbrought to the attention of authorities, what kind of crime would the company MOST likely be accused of?false advertisingOrestraint of tradeprice fixingfraud Which of these is the definition of the explorer physical hazard