If the user inputs “10” for the first expense and “20” for the second expense, what will the interpreter show in the final line when this program is run? If this result in not what the programmer intended, how would you explain what went wrong?

Answers

Answer 1
Yes :) I totally agree with the person above me ^

Related Questions

I cant get this for the life of me, I dont understand what im doing wrong, help?
def main():

numGuesses = 0
userGuess = 15
secretNum = 5

name = input("Hello! What is your name?")


userGuess = print ("Guess a number between 1 and 20:")

numGuesses = numGuesses + 1

if (userGuess < secretNum):
print("You guessed " + str(userGuess) + ". Too low.")

if (userGuess > secretNum):
print("You guessed " + str(userGuess) + ". Too high.")

if (userGuess = secretNum):
print9"Congrats! you are correct.")
main()

Answers

Answer:

what problems are you facing with this code?

Answer:

Your print statement has a 9 on it.

Which of the following is true about 'build' Maven life cycle?
A - It cleans up artifacts created by prior builds.
B - This is used to build the application.
C - This generates site documentation for the project.
D - None of the above.

Answers

Option B - "build" is used to build the application - is true about the Maven lifecycle.

In the Maven build lifecycle, the "build" phase is responsible for building the application. It compiles the source code, runs tests, and creates artifacts such as JAR or WAR files. Option A, cleaning up artifacts, is not part of the "build" phase but rather the "clean" phase.

Option C, generating site documentation, is handled by the "site" phase. The "build" phase focuses on assembling and packaging the application, making it ready for deployment or distribution. It ensures that the project's source code is compiled, dependencies are resolved, and the resulting artifacts are produced, preparing the application for further stages or use.

Learn more about Maven build lifecycle here: brainly.com/question/31148033

#SPJ11

computer network reduces expenses of an office justify this statement​

Answers

Answer:

Computer Network reduces expenses of an office. Justify this statement with an example. Computer Networks can allow businesses to reduce expenses and improve efficiency by sharing data and common equipment, such as printers, among many different computers.Explanation:

Explain LCD and give two example​

Answers

Answer:

LCD means least common denominator• a "Common Denominator" is when the bottom number is the same for the fractions.

Explanation:

Answer:

least common denominator.

Computer _ rely on up to date definitions?

A. Administrators
B. Malware Scan
C. Firmware updates
D. Storage Drivers

Answers

Answer:  The correct answer is B. Malware Scan

Explanation:

The word "definition" only applies to antivirus and malware removal applications that scan for patterns using the definitions. The other choices do not use definitions. Firmware updates rely on images, storage drives use drivers and administrators are user privilege type.

what happens if you add a finite number of terms to a divergent series or delete a finite number of terms from a divergent​ series?

Answers

When you add a finite number of terms to a divergent series or delete a finite number of terms from a divergent series, the series will still remain divergent. This is because the overall behavior of the series is not affected by the addition or removal of a finite number of terms. The series will continue to either grow without bound or not settle to a fixed value.

If you add a finite number of terms to a divergent series or delete a finite number of terms from a divergent series, the series still remains divergent. This is because a divergent series is one where the sum of the terms goes to infinity or negative infinity, and adding or deleting a finite number of terms does not change this fact. However, if you add or delete terms from a convergent series, it may change the sum of the series and whether it converges or diverges.
a divergent series is an infinite series that is not convergent, meaning that the infinite sequence of the partial sums of the series does not have a finite limit. If a series converges, the individual terms of the series must approach zero. Thus any series in which the individual terms do not approach zero diverges.

learn  more about divergent series here:

https://brainly.com/question/15415793

#SPJ11

The range of an unsigned 6 bit binary number is
0-63
0-64
0-127
1-128

Answers

Answer:

6 bit = 2^6-1=64-1=63

from 0 to 63

Which of the following statements holds true for the term plug-in? Group of answer choices It refers to a program (typically a marketing effort) that requires customer consent. It refers to a program that enrolls all customers by default, but that allows consumers to discontinue participation if they want to. It refers to the generation of bogus clicks, either for financial gain or to attack rivals by draining their online ad budget. It refers to a small computer program that extends the feature set or capabilities of another application. It refers to recruiting a network of users with the goal of spreading IP addresses across several systems.

Answers

Answer:

it refers to the generation of bogus clicks, either for financial gain or to attack rivals by draining their online ad budget

Explanation:

A plugin can be regarded as piece of software which serve as an add-on to a web browser, it provides the browser with additional functionality. It's functionality give room to a web browser so that the web can display additional content that was not designed to display originally. It should be noted that plug-in refers to the generation of bogus clicks, either for financial gain or to attack rivals by draining their online ad budget

define computer network​

Answers

Answer:

Explanation:

A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other.

Richard wants to share his handwritten class notes with Nick via email. In this scenario, which of the following can help Richard convert the notes into digital images so that he can share them via email? a. Bar coding device b. Digital printing software c. Document scanner d. Radio frequency identification tag

Answers

Answer: Document Scanner

Explanation: Cos then he can easily add the paper notes to his computer and email the client.

____________________ multiplexes or separates the data to be transmitted into smaller chunks and then transmitted the chunks on several sub channels.

Answers

Answer:

no one knows

Explanation:

Which of the following is used to represent comments in flowcharts?


A. Parallelogram

B. Diamond

C. Ghost rectangle or callout shape

D. Rectangle

Answers

The C. Ghost rectangle or callout shape is used to represent comments in flowcharts"

This shape is used to provide additional information or comments about a particular process or decision in a flowchart. It is typically a rectangular shape with a dashed or dotted border, and a tail pointing to the relevant step or decision. The parallelogram shape is used to represent input or output in a flowchart, while the diamond shape is used to represent decision points. The rectangle shape is used to represent a process or action in the flowchart. It is important to use the correct symbols and shapes in flowcharts to ensure clarity and accuracy in the representation of processes and decision-making.

learn more about  callout shape here:

https://brainly.com/question/19704602

#SPJ11

Which of the following is used to close up security holes?

Answers

The option that is used to close up security holes is to  Address Internal Threats.

What is security hole in cyber security?

In regards to computer security, the term security hole   is known to be a statement that connote a form of vulnerability as well as any form of weakness that can be seen  in a system.

This is known to be one that may be as a result of  a system design flaw or any form of bug.

If this is unresolved, such flaws can render a system vulnerable to attacks through the use of Internet that could act to compromise the integrity or confidentiality of that given system.

Therefore, The option that is used to close up security holes is to  Address Internal Threats.

Learn more about security from

https://brainly.com/question/25720881
#SPJ1

WILL GIVE BRAINLIEST!!!!!!!!

WILL GIVE BRAINLIEST!!!!!!!!

Answers

Answer:

camera

Explanation:

they used a camaera so technology inspired


Write the role of UPS and spike guard in terms of power protection.​

Answers

Answer:

It allows for safe and orderly shutdown of the Computer and Other Connected devices or equipments attached to It.  It can be used as an immediate backup during power cut or failure.

Explanation:

The role of the UPS and spike guard in power protection is absorption of power surges and fluctuations.

The spike guard is a device used to protect electrical equipments from fluctuations and surges.

The UPS is a device used to provide power backup been electrical power drops or fails to a certain unacceptable voltage level.

Role of UPSIt provides steady power to equipment during power failureIt absorbs power surges.

Role of spike guardIt protects electrical equipments from power fluctuationsIt also protects from power surges.

Therefore, the role of the UPS and spike guard in power protection is absorption of power surges and fluctuations.

Learn more about Uninterrupted power supply here:

https://brainly.com/question/7850680

#SPJ2

What does firewall do

Answers

Answer:

help

Explanation: to make people blocked on school computer

Which of the following is an incorrect statement?The cloud consumers save money because they can select most appropriate (effective) cloud services for their business operations.Adopting the cloud services saves the capital expenses, but, it does not save the operational costs.Like the cloud consumers, the cloud service providers can lease resources on the on-demand basis.Consumers save money because the cloud service providers purchase IT resources at the large scale and lower

Answers

"Adopting the cloud services saves the capital expenses, but, it does not save the operational costs." Adopting cloud services can also save operational costs as businesses don't have to maintain and upgrade their own IT infrastructure.

It is untrue to say that Adopting cloud services will save you money on capital expenses but not on operating costs. In fact, Adopting cloud services can save money on both capital and operating costs. Because businesses no longer need to invest in their own IT infrastructure, such as servers and data centers, moving to the cloud can save capital expenses. Additionally, cloud service providers frequently provide flexible pricing plans that let companies only pay for the resources they really utilize. Because cloud service providers handle the infrastructure, organizations can concentrate on their core business operations and save operational costs. Cloud services also offer scalability and flexibility, enabling companies to swiftly modify resources in response to demand.

learn more about Adopting cloud services here:

https://brainly.com/question/24118821?

#SPJ11

anyone know how to do this

anyone know how to do this

Answers

The completed program that finds the area and perimeter of the rectangle using a C Program is given below:

The Program

// C program to demonstrate the

// area and perimeter of rectangle

#include <stdio.h>

int main()

{

int l = 10, b = 10;

printf("Area of rectangle is : %d", l * b);

printf("\nPerimeter of rectangle is : %d", 2 * (l + b));

return 0;

}

Output

The area of the rectangle is : 100

The perimeter of the rectangle is : 40

If we make use of functions, it would be:

// C program to demonstrate the

// area and perimeter of a rectangle

// using function

#include <stdio.h>

int area(int a, int b)

{

int A;

A = a * b;

return A;

}

int perimeter(int a, int b)

{

int P;

P = 2 * (a + b);

return P;

}

int main()

{

int l = 10, b = 10;

printf("Area of rectangle is : %d", area(l, b));

printf("\nPerimeter of rectangle is : %d",

 perimeter(l, b));

return 0;

}

Output

The area of rectangle is : 100

The perimeter of rectangle is : 40

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Oldnavy.Gap.com sells clothing and accessories. They want their line of maternity clothing to show up on searches that include 'maternity'. What should the URL for the maternity category be? https://Oldnavy.Gap .maternity.com/ https://Oldnavy.Gap .com/maternity https://maternity.Oldnavy.Gap com/ https://Oldnavy.Gap .com/category5

Answers

Answer:

Explanation:

The URL for the maternity category on Oldnavy.Gap.com should be **https://Oldnavy.Gap.com/maternity**.

Including the keyword "maternity" directly in the URL helps search engines understand the relevance of the page to maternity-related searches. By placing "maternity" as a subdirectory within the main domain, the URL structure becomes logical and intuitive for both users and search engines.

Therefore, the correct URL for the maternity category would be **https://Oldnavy.Gap.com/maternity**.

Learn more about  maternity here:

https://brainly.in/question/37980162

#SPJ11

Which piece of equipment is necessary for a student to respond to tasks in the speaking test?

Speakers

CD player

Headphones

Headset with a microphone

Answers

D) Headset with a microphone is necessary for a student to respond to tasks in the speaking test.

Having the right headset with a microphone is essential for students who are taking a speaking test.

With the right headset, students can respond to tasks easily, ensuring that their answers are accurately heard and evaluated by the test instructor.

By investing in a quality headset with a microphone, students can ensure they are well-prepared to perform their best in the speaking test.

It is essential for students to have a headset with a microphone when taking the speaking test.

Without a headset, students will not be able to respond to tasks and will be unable to complete the test. Make sure to equip your students with the necessary tools to ensure they can complete the speaking test with ease.

To learn more about microphone, click here:

https://brainly.com/question/12484674

#SPJ4

Select the correct answer from each drop-down menu A manipulator and the end effector work together to execute a robot's tasks A manipulator is a series of joined segments, whose function is to capable of The manipulator is thus​

Select the correct answer from each drop-down menu A manipulator and the end effector work together to

Answers

The end effector and the manipulator collaborate to carry out a robot's operations. A manipulator is made up of a number of connected segments that are used to position and direct the end effector.

Which area of the robotic manipulator is utilized for object positioning within the robot work volume?

The robot manipulator is divided into two parts: Body-and-arm - for positioning things within the work volume of the robot. Wrist assembly for object orientation.

Where is the manipulator's end effector connected?

An end effector is an accessory that fastens to a robot's wrist and enables it to interact with the task at hand.

To know kore about manipulator visit:-

https://brainly.com/question/30002364

#SPJ1

Additional Activities Direction: List down all the safety and work procedures in using newly purchased gadget. Write your answers on a separate sheet of paper.​

 Additional Activities Direction: List down all the safety and work procedures in using newly purchased

Answers

Answer: Keep your phone away from your body and head. Turn off your phone or turn on airplane mode at bedtime. Use headsets, preferably air tube, and speaker phone when possible. Don't carry your cell phone in your bra, shirt, or front pants pocket, especially if you're pregnant.

Explanation:

1. which is faster, an esata-600 port or a firewire 800 port?

Answers

The eSATA-600 port is faster than the FireWire 800 port. The eSATA-600 port has a data transfer rate of up to 600 MB/s, while the FireWire 800 port has a transfer rate of up to 800 Mbps (approximately 100 MB/s).

The eSATA-600 port is a faster data transfer interface compared to the FireWire 800 port. The eSATA-600 port can transfer data at a rate of up to 600 megabytes per second (MB/s), while the FireWire 800 port can transfer data at a rate of up to 800 megabits per second (Mbps), which is approximately 100 MB/s. The higher transfer rate of eSATA-600 makes it a more suitable choice for transferring large amounts of data quickly, such as when working with high-definition video or large files. However, both ports have their own strengths and weaknesses, and the choice of which one to use ultimately depends on the specific needs of the user.

Learn more about FireWire here;

https://brainly.com/question/11179545

#SPJ11

If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role should you configure?

Assignee
Client
Delegate
Manager

Answers

Answer:

I think it's B, Delegate

Explanation:

Cause the other options didn't seem to fit as the answer.

I really don't know though.

A delegate is someone who has been granted permission by another user to access. The correct answer would be an option (C).

What is a mailbox?

A computer-simulated mailbox that stores email messages. Mailboxes are saved on a disc as a message file or a message database.

A delegate is someone who has been granted permission by another user to access and manage their mailbox, including sending and responding to email messages on their behalf.

When you grant delegate access to another person, you are giving them the ability to access specific folders within your mailbox and perform specific actions, such as reading, sending, and deleting email messages.

Assignee, client, and manager are not terms typically used in the context of delegate access in email systems.

Thus, the correct answer would be option (C).

Learn more about the mailbox here:

https://brainly.com/question/28430685

#SPJ6

Wesellyoubuy, a consumer electronics company, received consumer complaints about its employees not being able to communicate with consumers properly. After investigating the prime reason behind these complaints, the management found that the consumer service employees were following the same strategy to address all types of consumer issues. The management immediately started a new training program for the consumer service employees where they were trained to respond to every possible query a consumer might have. Eventually, their service ratings and sales showed improvement. In this scenario, the consumer service team improved _____.

Answers

Answer:

customer satisfaction

Explanation:

The consumer electronics company started a new training program for the consumer service employees as the company found that the consumer service employees were following the same strategy to address all types of consumer issues due to which they were not able to communicate with consumers properly.

This leads to improvement in service ratings and sales.

In this scenario, the consumer service team improved customer satisfaction

The point of entry from a wireless device to a wired network is performed at a device called a(n) ____________________.

Answers

Answer:

wireless access point

In computer networking, a wireless access point (WAP), or more generally just access point (AP), is a networking hardware device that allows other Wi-Fi devices to connect to a wired network.

g in the following public key encryption scenarios where you are communicating with me, please tell me the secrecy/authentication purpose of the following exchanges. (2pts)

Answers

One of the most significant advancements in public-key cryptography was the Diffie-Hellman key exchange, which is still extensively used in a variety of modern security protocols.

One of the most significant advancements in public-key cryptography was the Diffie-Hellman key exchange, which is still extensively used in a variety of modern security protocols.

It makes it possible for two parties who have never met before to safely create a key that they can use to encrypt their communications. This article will describe its applications, how it operates step-by-step, its various variations, and the security issues that must be taken into account before using it.

The first widely used technique for securely creating and exchanging keys over an unsecure channel was the Diffie-Hellman key exchange.

In light of the aforementioned, it might not seem particularly novel or exciting, so let's provide an illustration.

To know more about public-key cryptography click here:

https://brainly.com/question/15205343

#SPJ4

the form will consists of the following: a text box where an individual's ucid can be type in a submit button which the user will click to activate a js script that will validate the input.

Answers

The form will consist of a text box where an individual's UCID can be typed in, and a submit button. When the user clicks on the submit button, a JavaScript script will be activated to validate the input.


Create a form in HTML with a text box and a submit button. Use JavaScript to attach an event listener to the submit button. In the event listener function, retrieve the value entered in the text box. Use regular expressions or other validation techniques to check if the input matches the desired format for a UCID. If the input is valid, perform any additional actions required (e.g., submit the form, display a success message).

If the input is not valid, display an error message to the user indicating the issue with their input.To create a form with a text box for UCID input and a submit button, you can use HTML. To validate the input using JavaScript, attach an event listener to the submit button. Retrieve the input value, validate it using regular expressions or other techniques, and display an error or success message accordingly.

To know more about UCID  visit:

https://brainly.com/question/33638134

#SPJ11

You have been on the phone with a user in a remote office for 30 minutes troubleshooting their minor desktop problem. no matter how many times you explain the solution to them, they do not understand what you are saying. what should you do

Answers

You should consider alternative communication methods such as providing written instructions or scheduling a screen-sharing session.

In this situation, it is recommended to consider alternative communication methods to ensure effective understanding and resolution of the problem. One option is to provide step-by-step written instructions or documentation that the user can follow at their own pace. This can help clarify the solution and allow the user to refer back to the instructions if needed.

Another option is to schedule a remote screen-sharing session where you can visually demonstrate the troubleshooting steps or directly take control of the user's desktop to resolve the problem yourself. This can provide a more hands-on and interactive approach to problem-solving.

Option: The correct answer is to consider alternative communication methods such as providing written instructions or scheduling a screen-sharing session.

You can learn more about screen-sharing session at

https://brainly.com/question/20165875

#SPJ11

you need to create a report to display the names of customers with a credit limit greater than the average credit limit of all customers. which select statement should you use? a. select last name, first name from customer where credit limit > avg(credit limit); b. select last name, first name, avg(credit limit) from customer group by avg(credit limit); c. select last name, first name, avg(credit limit) from customer group by avg(credit limit) having credit limit > avg(credit limit); d. select last name, first name from customer where credit limit > (select avg(credit limit) from customer); e. select last name, first name from customer where credit limit

Answers

The correct select statement to display the names of customers with a credit limit greater than the average credit limit of all customers is option (d): "select last name, first name from a customer where credit limit > (select avg(credit limit) from customer);".

This statement uses a subquery to calculate the average credit limit of all customers and then compares each customer's credit limit with the average using the "where" clause. Option (a) is incorrect because it does not calculate the average credit limit of all customers, but rather the average credit limit of only the customers who meet the condition. Option (b) is incorrect because it includes the average credit limit in the output, which is not necessary for the report. Option (c) is incorrect because the "having" clause is used to filter groups based on a condition, not individual rows. Option (e) is incorrect because it does not compare the credit limit with the average credit limit.

Find out more about subquery

brainly.com/question/29575628

#SPJ4

Other Questions
At a yard sale, Jane sold 2 bicycles for $24.50 each, 3 games for $2.75 each, a video for $4.50, and a book for $0.25. How much money did she make? Can you solve them for me all four. Write an explicit formula that represents the sequence defined by the following recursive formulaplease help Eleanor is the owner of a cupcake bakery. She sells different flavors and sizes of cupcakes, but in general, she believes that when she puts chocolate frosting on the cupcakes, people are more satisfied. She is proposing an experimental study to examine this belief 2 -4 6 -8 10 next 3 terms arithmetic or not? Whats the difference between rhyme, rhythm, and beat in poetry? What can you predict regarding the probability of the coin landing heads up?--------------------------------------------------------------------------------------------A.The frequency does not change with more trials.B.The experimental probability increases with more trials.C.With more trials, the frequency of heads up will equal the frequency of tails up.D.The frequency of heads up decreases with more trials. Choose the correct form of the irregular preterite verb that correctly completes each se1. Yo - andarA. anduveB. anduvoC. andD. ando What is the center of a circle whose equation is x2 + y2 12x 2y? The figure shows two similar prisms, if the volume of Prism I is 30 cm, find the volume of Prism 2. (3 marks) Prism 2 Prism I 1:07 12 cm 6 cm SumiCal's go cart has a gas tank with the dimensions shown below.He uses a gas can that holds 1 liter of gas, to fill the go cart tank.1 liter = 1000 cmand dcmand dems25 cm40 cmHow many full gas cans will it take to fill the go cart's gas tank? Question 2Provide the names for the following (3 points each):a) Blank 1b) Blank 2Questions Filter (8)H CH3 H1-0--CIICIH--HIC H15 F How could the loss of biodiversity affect humans? a lead-tin alloy of composition 30 wt% sn-70 wt% pb is slowly heated from a temperature of 1500c(3000f). what is the composition first liquid form? object a has mass 7 kg and initial momentum kgm/s, just before it strikes object b, which has mass 9 kg. just before the collision object b has initial momentum kgm/s. I really really really need help with this Stoichmetric calculations must not be based on the limiting reagenttrue or false What was the main difference between the French and British armies in the French and Indian war? If an increase in the price of coconut oil brings about an increase in total revenue, then the percent rise in price is _____ in magnitude than the percent decline in quantity demanded. Read the dialogue and select the correct option that completes the sentence.Elsa: Buenas tardes, Laura. A qu hora es la clase de francs?Laura: Es a las diez menos veinticinco.Elsa: Gracias, y la clase de qumica?Laura: Empieza a las doce y cuarto.Based on the dialogue, her classes are at ___________. 10:25 and 11:15 10:35 and 12:04 9:35 and 12:15 9:25 and 11:34