Write a python program using "Nested if statement" that will

ask the users to enter their age and if they are registered to

vote. Then print a message informing them that they can vote,

or a message explaining why they cannot vote (underage or not.

registered)

They can vote only if they are over 17 years of age and

registered to vote.

o

O

Answers

Answer 1

The Python program using nested if statements that will ask the user for their age and if they are registered to vote. The program will then print a message to inform them if they can vote or not.

The program first asks the user to input their age as an integer using the `input()` function and converting it to an integer using the `int()` function. The program then asks if the user is registered to vote using the `input()` function. The program uses a nested if statement to check if the user is eligible to vote.

The outer if statement checks if the user is 18 years or older. If the user is 18 years or older, the inner if statement checks if the user is registered to vote. If the user is registered to vote, the program prints a message informing them that they can vote. If the user is not registered to vote, the program prints a message explaining why they cannot vote.

To know more about program visit:

https://brainly.com/question/11023419

#SPJ11




Related Questions

9. Which of the following will best protect your computer from viruses and hackers?
A. A passcode
O B. A Trojan horse
O C. Avoiding strangers on the Internet
OD. Antivirus software

Answers

Answer:

D

Explanation:

I believe its Antivirus software because it protects your computer from virus and hackers . If i am wrong im so sorry

Have A Good Day

Antivirus software best protect your computer from viruses and hackers.

The correct option is D.

Antivirus software:

Antivirus software is a program that is designed to protect computer against harmful software, also known as malware. Antivirus software scans your computer for any viruses and malware and removes them from your system.

Antivirus software is crucial in protecting computer from viruses and hackers. It can detect and eliminate malicious software before it can damage your computer or compromise your data.

Therefore, having antivirus software installed on your computer is important in keeping your system secure and preventing unauthorized access by hackers and other malicious actors.

The correct option is D.

Know more about Antivirus software,

https://brainly.com/question/32545924

#SPJ3

Please select the word from the list that best fits the definition

A small farmer who did not own land

Answers

That would be a peasant, hope this helps ^^

Answer:

peasant

Explanation:

right on edge

features of web browsers​

Answers

Explanation:

Navigation buttons. Refresh button is used to go back and forward while browsing. ...

Refresh button. Refresh buttons is used to force web browser to reload webpage. ...

Stop button. ...

Home button. ...

Web browser's address bar. ...

Integrated search. ...

Tabbed browsing. ...

Bookmark buttons.

a method that does very little other than organizing the calls to other methods is known as

Answers

A method that does very little other than organize the calls to other methods is known as a "wrapper method" or a "facade method."

A wrapper method acts as a simplified interface or a higher-level abstraction that encapsulates the complexity of multiple method calls. It helps improve code organization and readability by providing a cohesive and streamlined way to access or coordinate functionality from other methods or components. The purpose of a wrapper method is not to perform substantial logic or computations itself, but rather to delegate the work to other methods or components. It serves as a convenient entry point or coordinator, allowing the calling code to interact with the underlying functionality without needing to know the details of the individual method calls.

Learn more about wrapper methods here:

https://brainly.com/question/28566814

#SPJ11

Cuál es la dirección de la última fila y columna de excel

Answers

Answer:

XFD 1,048,576.

Explanation:

Excel es un programa de Microsoft por el cual se generan bases de datos y planillas de cálculo, que permiten al usuario desarrollar registros contables referidos a sus distintas actividades comerciales, laborales o de otra índole, así como también realizar cálculos matemáticos y operaciones lógicas a través de distintas fórmulas. En la actualidad, el programa tiene un máximo de 16.384 columnas y 1.049.576 filas, con lo cual la ultima fila y columna de una hoja de cálculo será XFD 1.048.576.

2015 POPULATION
6,341
8,863
1,057
6,839
9,362
7,459
2,382
613
5,533
71,474
126,427
38,640
54,792
Use the Microsoft Excel’s LEFT() function to extract the leading digits to create a new column, namely "Bins", with values from 1 to 9.
Use the COUNTIF() function to calculate the frequencies for each digit (i.e., the number of appearance for each "bin").
Convert frequencies to relative frequencies by dividing each frequency by the sum of all frequenci

Answers

Use =LEFT(A1,1) in B1 and copy down; use =COUNTIF(B:B,C1) in D1 and =D1/SUM(D:D) in E1, copy down to calculate frequencies and relative frequencies for the leading digit bins in the population data in column A.

How to extract leading digits and calculate frequencies in Excel for a population data set?

Assuming that the population data is in column A, here are the steps to extract the leading digits and create a new column for "Bins":

In cell B1, enter the formula =LEFT(A1,1) and press Enter.

Copy the formula down to the rest of the cells in column B to extract the leading digit for each population value.

In cell C1, enter the value 1, and in cell C2, enter the formula =C1+1. Copy the formula down to the rest of the cells in column C to generate the values from 1 to 9.

Next, here are the steps to calculate the frequencies and relative frequencies:

In cell D1, enter the formula =COUNTIF(B:B,C1) to count the number of times the digit in column C appears in column B. Copy the formula down to the rest of the cells in column D to calculate the frequencies for each bin.

In cell E1, enter the formula =D1/SUM(D:D) to calculate the relative frequency for bin 1. Copy the formula down to the rest of the cells in column E to calculate the relative frequencies for all bins.

Note that the above formulas assume that the data starts in row 1. If the data starts in a different row, adjust the cell references accordingly.

Learn more about Bins.

brainly.com/question/24415267

#SPJ11

An article in the Transportation Research Part E Journal ["Arc Routing Problems to Restore Connectivity of a Road Network" (2016)] considered ways of re-establishing the connectivity of road networks after a natural disaster − earthquake. Estimates of the probabilities of a randomly chosen road being under light debris, moderate debris, and heavy debris conditions after different disaster magnitudes are shown in the following table. Disaster magnitude is equally likely to be low, moderate or high. Given that a road had light debris after an earthquake, what is the conditional probability that the disaster magnitude was low? Round your answer to two decimal places (e.g. 98.76). P=

Answers

The conditional probability that the disaster magnitude was low, given that a road had light debris after an earthquake, is approximately 0.33.

It applies Bayes' theorem to calculate the conditional probability of the disaster magnitude being low, given that a road had light debris after an earthquake.

Here's a summary of the solution:

Let P(A) be the probability that the disaster magnitude was low, and P(B) be the probability that a road has light debris.

P(A) = P(disaster magnitude is low) = 1/3 (since disaster magnitude is equally likely to be low, moderate, or high)

P(B) = P(Light debris) = 0.2 (given in the table)

The conditional probability P(A|B), which represents the probability of the disaster magnitude being low given that a road had light debris after an earthquake, is calculated using Bayes' theorem:

P(A|B) = P(B|A) * P(A) / P(B)

Where:

P(B|A) is the probability of light debris given that the disaster magnitude was low (from the table) = 0.2

Substituting the values:

P(A|B) = (0.2 * 1/3) / 0.2

P(A|B) = 0.33 (approximately)

Note: The solution provides a clear explanation of the steps involved and uses Bayes' theorem to calculate the required conditional probability.

Understanding the concept and applying the formula correctly is crucial in solving such probability problems.

To know more about magnitude visit:

https://brainly.com/question/31022175

#SPJ11

Need the answer ASAP!!!!!!!!
I’ll mark brainliest if correct

Drag each label to the correct location on the image. Match the correct component to the part on the flowchart

Procedure 1

subroutine

procedure 2

decision

input

End

Start

Need the answer ASAP!!!!!!!! Ill mark brainliest if correct Drag each label to the correct location on

Answers

Answer:

Start

 subroutine

imput

decision

Procedure 1

procedure 2

End

Explanation:

Which TCP/IP protocol is a secure form of HTTP that uses SSL as a sub-layer for security?
a. DNS
b. SSH
c. HTTPS
d. SMTP

Answers

The TCP/IP protocol that is a secure form of HTTP and uses SSL as a sub-layer for security is c. HTTPS. The TCP/IP protocol that provides a secure form of HTTP and utilizes SSL (Secure Sockets Layer) as a sub-layer for security is HTTPS.

a. DNS (Domain Name System) is a protocol used for resolving domain names into IP addresses but does not provide security features for HTTP communication.

b. SSH (Secure Shell) is a network protocol used for secure remote login and command execution on a network, but it is not directly related to HTTP or SSL.

c. HTTPS (Hypertext Transfer Protocol Secure) is a combination of HTTP and SSL/TLS (Transport Layer Security) protocols. It ensures secure communication by encrypting the data exchanged between a web server and a client, providing confidentiality and integrity for sensitive information.

d. SMTP (Simple Mail Transfer Protocol) is a protocol used for email transmission but does not incorporate SSL or provide security for HTTP communication.

The secure form of HTTP that uses SSL as a sub-layer for security is HTTPS. It provides secure and encrypted communication between clients and web servers, protecting sensitive information transmitted over the network.

You can learn more about TCP/IP protocol, visit: brainly.com/question/30610215

#SPJ11

the report style you select does not control the overall formatting of your report is it true ? word

Answers

Question is that it is true that the report style you select in Microsoft Word does not control the overall formatting of your report.

When you select a report style in Word, it primarily affects the formatting of headings, titles, and subheadings within your report. However, the overall formatting, such as page margins, font styles, and line spacing, is controlled by the document's default settings or the formatting you manually apply.

So, even if you choose a different report style, it won't automatically change the overall formatting of your report. You would need to adjust the formatting settings or manually apply formatting changes to achieve the desired overall appearance of your report.

To know more about microsoft visit:

https://brainly.com/question/33891422

#SPJ11

you plan to deploy the following azure web apps: webapp1, that uses the .net 6 runtime stack webapp2, that uses the asp.net v4.8 runtime stack webapp3, that uses the java 17 runtime stack webapp4, that uses the php 8.0 runtime stack you need to create the app service plans for the web apps. what is the minimum number of app service plans that should be created?

Answers

Since you need to create the App Service plans for the web apps, the minimum number of App Service plans that must be created is option A-1.

How does Azure webapp work?

Without needing to deploy, set up, and maintain your own Azure VMs, you may create an app in Azure using the platform offered by Azure Web Apps. The ASP.NET, PHP, Node. js, and Python may all be used to create web applications. Additionally, they incorporate well-known coding environments like GitHub and Visual Studio.

Microsoft developed and maintains Azure Web Apps, a platform for hosting websites based on cloud computing. It is a platform as a service that enables the publishing of Web apps using several frameworks and different programming languages, including proprietary ones from Microsoft.

Therefore, You can support up to 10 Web Apps by creating one App Service Plan. Any additional use of the other resources is unnecessary and not specified as a prerequisite.

Learn more about  azure web apps from

https://brainly.com/question/28813133
#SPJ1

See full question below

You plan to deploy the following Azure web apps:

WebApp1, which uses the .NET 5 runtime stack

WebApp2, which uses the ASP.NET V4.8 runtime stack

WebApp3, which uses the Java 11 runtime stack

WebApp4, which uses the PHP 8.0 runtime stack

You need to create the App Service plans for the web apps.

What is the minimum number of App Service plans that must be created?

A-1

B-2

C-3

D-4

If you have verified that the update you made is correct, you can use the ____ command to make the update permanent.​
a.​ ROLL
b.​ SAVE
c.​ COMMIT
d.​ UPDATE

Answers

The correct answer to the question is option C: COMMIT. Once you have made an update to a database, it is important to ensure that the changes you have made are saved permanently.

This is where the COMMIT command comes in handy. When you issue the COMMIT command, the changes that you have made are permanently saved to the database. This means that they will be available even if you close the database and reopen it at a later time. It is important to note that the COMMIT command is not the same as the SAVE command. The SAVE command is typically used to save a copy of a database or file to a different location, while the COMMIT command is used specifically to save updates to a database.

In conclusion, if you want to make sure that your database updates are saved permanently, you should use the COMMIT command. This will ensure that your changes are available for future use and will not be lost if the database is closed or shut down.

Learn more about database here : https://brainly.com/question/29775297

#SPJ11

What term refers to the computer hardware, software, and networks that are used to record, store, and manage patient healthcare information?

Answers

Health information technology is a vital component of modern healthcare systems, promoting better patient outcomes and driving advancements in the healthcare industry.

The term that refers to the computer hardware, software, and networks used to record, store, and manage patient healthcare information is "health information technology" (Health IT). Health IT encompasses various technologies and systems designed to improve the quality, efficiency, and security of healthcare data.

1. Electronic Health Record (EHR): This is a digital version of a patient's paper medical record. It contains comprehensive information about the patient's medical history, diagnoses, medications, allergies, test results, and treatment plans. EHRs allow healthcare providers to access and share patient information securely, improving care coordination and reducing medical errors.

2. Health Information Exchange (HIE): HIE enables the exchange of patient health information between different healthcare organizations. It allows authorized healthcare providers to securely access and share patient data, promoting seamless communication and continuity of care.

3. Computerized Physician Order Entry (CPOE): CPOE systems allow healthcare providers to enter and manage patient orders electronically. This includes medication orders, laboratory tests, and diagnostic imaging requests. CPOE systems improve accuracy, reduce errors, and streamline workflow.

4. Clinical Decision Support Systems (CDSS): CDSS provide healthcare professionals with evidence-based information and guidelines to support clinical decision-making. These systems analyze patient data and provide alerts, reminders, and recommendations for diagnosis, treatment, and preventive care.

5. Telehealth and Telemedicine: These technologies enable remote healthcare services, allowing patients to consult with healthcare providers through video calls, remote monitoring devices, and online portals. Telehealth expands access to care, particularly for individuals in remote areas or with limited mobility.

Health IT plays a crucial role in enhancing patient care, improving efficiency, and ensuring data security in healthcare settings. By digitizing and integrating healthcare information, these technologies enable better communication, decision-making, and overall healthcare delivery.

Learn more about Health information technology  here:-

https://brainly.com/question/26370086

#SPJ11

For this interactive assignment, you will apply all the concepts you learned in previous weeks and apply the use of sequential input and output operations to add two new functionalities to your Employee Management System.
Export employees’ information to text file: This functionality will allow the user to save the employee information saved in the list to the file system. Each list entry should be saved into a new line. You may notice by now that closing the script will cost your Employee Management System to lose all entered employees’ information. Exporting the current system data into a file system will help you to save this information permanently on the hard disk and be able to use it at later time.
Import employees’ information from text file: This functionality will help you to import preexisting employee information from a text file saved on the file system. Each line in the text should be saved as a new list entry. When you run your Employee Management System for the first time you should be able to populate the system with preexisting employee information, if there are any, instead of adding this information manually to the system.
Once you have completed the functionalities, provide the following in your initial post:
One screen shot of each completed functionality.
An explanation of how you applied the use of sequential input and output operations to add the two new functionalities to the Employee Management System.
A brief description the purpose of this functionality.
The script for each functionality.
The attached zip folder that contains the running source code. Your instructor will run your source code to ensure that the functionality runs correctly. # Initiate global variable to store all the employees
employees = []
# Count variables to store the count of variables
count = 0
# Function to add an employee
def add_employee():
# initialize employee list to store the details of each employee
global count
employee = []
# increase the number of employees
count += 1
# taking employee details
print("Enter the name of the employee : ", end=" ")
employee.append(input())
print("Enter the SSN of the employee : ", end=" ")
employee.append(input())
print("Enter the phone of the employee : ", end=" ")
employee.append(input())
print("Enter the email of the employee : ", end=" ") employee.append(input())
print("Enter the salary of the employee : ", end=" ")
employee.append(input())
employees.append(employee)
# function to view the details of the employees
def view_all_employees():
for i in employees:
# to get one of the employees details
print(f"-----------Name : {i[0]}----------")
print("SSN : ", i[1])
print("Phone : ", i[2])
print("Email : ", i[3])
print("Salary : ", i[4])
print("------------------------------------")
# to get the employee count
print(f"Number of employees in the company is {count}")
# function to search employee
def search_employee():
find_emp = input("Please input employee SSN : ") # to select employee
found = False for item in employees:
if item[1] == find_emp: # To input new details
change_name = input('Please enter new name : ')
change_SSN = input('Please enter new SSN : ')
change_phone = input('Please enter new phone number : ')
change_email = input('Please enter new email : ')
change_salary = input('Please enter new salary : ')
item[0] = change_name
item[1] = change_SSN
item[2] = change_phone
item[3] = change_email
item[4] = change_salary
found = True
if found == False:
print("Employee not found")
# user menu for entering the details
while True:
print("Enter -1 to exit")
print("Enter 1 to add employee")
print("Enter 2 to view all employees")
print("Enter 3 to search employee")
print("Enter 4 to update employee details")
selection = int(input("Selection : "))
if selection == -1: # if user inputs -1, loop exits
break
elif selection == 1: # if user inputs 1 to add employee
add_employee() # calls add_employee function
elif selection == 2: # user inputs 2 to view all employees
view_all_employees() # calls the view_all_employees function elif selection == 3: # user inputs 3 to search employee by SSN
search_employee() # calls the search_employee function
elif selection == 4: # user inputs 4 to modify employee details
update_employee_details() # calls teh update_employee_details function
else:
print("Invalid response") # if user inputs any other response

Answers

Here is the completed solution for the Employee Management System. Sequential input and output operations were used to add the two new functionalities: Exporting employees’ information to a text file and importing employees’ information from a text file.

The purpose of these functionalities is to allow the user to save and import employee information from a text file saved on the file system and to export the current system data into a file system so that it can be saved permanently on the hard disk and used later.

A screenshot of each completed functionality will be provided as well as a brief description of how the two new functionalities were applied to the Employee Management System. Additionally, the script for each functionality will be provided, along with an attached zip folder that contains the running source code.

To know more about Employee Management System

https://brainly.com/question/33344148

#SPJ11

The explosion that forces the piston downward which supplies power to a machine is ignited by the ??
A pilot light
B compression chamber
C ignition manger
D none

Answers

Answer:

Explanation:

The air and fuel in the combustion chamber is compressed as the piston moves upward. The spark plug that ignites the fuel and air results in an explosion that pushes the piston back down again.

Choose the appropriate assistive technology for each situation.

A person with a visual impairment could use a

to help them interact with a computer.

Someone with a mobility impairment might use

to interact with web sites and applications.


are an assistive tool that helps someone with a hearing impairment, access audio content.

Answers

Answer:

-Screen Reader

-Tracking Device

-Transcript

Explanation:

Just did it :p

Answer:

-Screen Reader

-Tracking Device

-Transcript

Explanation:

Match each example to the type of component, either Input, Process, or Output.

fermentation

newly painted structure

employees in a
management team

program code for
a software application

flour for making bread

harvesting a crop

freshly mowed lawn

a wrench

hot muffins

dryer spinning at

top speed

Match each example to the type of component, either Input, Process, or Output.fermentationnewly painted

Answers

Answer:

Find answers below.

Explanation:

1. Input: it takes in data in its raw format or an item that receives data and transfers them to the process.

Employees in a management team. Program code for a software application. Flour for making bread.A wrench.

2. Process: it converts the data from an input to a usable format. Also, it conveys the processed data (informations) to the output.

Fermentation. Harvesting a crop. Dryer spinning at top speed.

3. Output: it is the result produced by a process i.e the finished product.

Newly painted structure. Freshly mowed lawn. Hot muffins.

What is the result when you run the following program?

print(“2 + 7”)
print(3 + 1)

Answers

Answer:

line 1 = 2+7 (you added quote marks)

line 2 = 4 (you did not add quote marks, which adds both nums together)

Explanation:

What makes manually cleaning data challenging?

Answers

Manually cleaning data is done manually which makes it challenging. This make it prone to mistakes.

It is difficult to manually clean the data since you must examine each data point separately and fix any errors.

What is data cleaning?

The way of locating and fixing flaws, inconsistencies, and inaccuracies in datasets in order to enhance data quality is renowned as data cleaning, sometimes referred to as data cleansing or data scrubbing.

For a variety of reasons, encompasses the following, manually cleansing data can be difficult:

Data volume: As large datasets can have millions of rows and thousands of columns, manually identifying and fixing problems in each row and column is difficult and time-consuming.Data can be gathered from several sources, which can result in inconsistencies and errors including misspellings, missing numbers, and duplication that can be difficult to find and correct.Data complexity makes it difficult to interpret and standardize since it can include information in a variety of formats, like text, numbers, or category categories.

Thus, this makes manually cleaning data challenging.

For more details regarding data cleaning, visit:

https://brainly.com/question/13085801

#SPJ6

write the home cell of MS Excel.​

Answers

Answer:

MS Excel

Explanation:

There are some processes that need to be executed. Amount of a load that process causes on a server that runs it, is being represented by a single integer. Total load caused on a server is the sum of the loads of all the processes that run on that server. You have at your disposal two servers, on which mentioned processes can be run, Your goal is to distribute given processes between those two servers in the way that, absolute difference of their loads will be minimized. Write a function: class solution { public int solution(int[] A); } (JAVA) that, given an array of A of N integers, of which represents loads caused by successive processes, the function should return the minimum absolute difference of server loads. For example, given array A such that:


A[0] = 1

A[1] = 2

A[2] = 3

A[3] = 4

A[4] = 5


Your function should return 1. We can distribute the processes with loads 1,2,3,4 to the first server and 3,5 to the second one, so that their total loads will be 7 and 8, respectively, and the difference of their loads will be equal to 1

Answers

The Java code that solves this problem has been written in  the space below

How to write the Java code

public class Solution {

   public int solution(int[] A) {

       int totalLoad = 0;

       for (int load : A) {

           totalLoad += load;

       }

       int server1Load = 0;

       int server2Load = totalLoad;

       int minAbsoluteDifference = Integer.MAX_VALUE;

       for (int i = 0; i < A.length - 1; i++) {

           server1Load += A[i];

           server2Load -= A[i];

           int absoluteDifference = Math.abs(server1Load - server2Load);

           minAbsoluteDifference = Math.min(minAbsoluteDifference, absoluteDifference);

       }

       return minAbsoluteDifference;

   }

}

Read mroe on Java code here https://brainly.com/question/25458754

#SPJ1

Explain how Steve Jobs created and introduced the iPhone and iPad.

Answers

Answer:Today, we're introducing three revolutionary products. The first one is a widescreen iPod with touch controls. The second is a revolutionary mobile phone. And the third is a breakthrough Internet communications device. So, three things: a widescreen iPod with touch controls, a revolutionary mobile phone, and a breakthrough Internet communications device. An iPod, a phone, and an Internet communicator. An iPod, a phone...are you getting it? These are not three separate devices. This is one device. And we are calling it iPhone. Today, Apple is going to reinvent the phone.

Late last year, former Apple engineer Andy Grignon, who was in charge of the radios on the original iPhone, gave behind-the-scenes look at how Apple patched together demos for the introduction, with Steve Jobs showing off developmental devices full of buggy software and hardware issues. The iPhone team knew that everything had to go just right for the live iPhone demos to succeed, and they did, turning the smartphone industry on its head even as Apple continue to scramble to finish work on the iPhone.

Apple had actually been interested first in developing a tablet known as "Safari Pad", but as noted by a number of sources including Steve Jobs himself, the company shifted gears once it became clear how revolutionary the multi-touch interface developed for the tablet could be for a smartphone. Apple's tablet wouldn't surface until the launch of the iPad in 2010, three years after the introduction of the iPhone.

Seven years after the famous Macworld 2007 keynote, the iPhone has seen significant enhancements in every area, but the original iPhone remains recognizable as Apple has maintained the overall look of a sleek design with a larger touchscreen and a single round home button on the face of the device.

Explanation:

A false warning designed to trick users into changing security settings on their computer.a. trueb. false

Answers

True.

A false warning designed to trick users into changing security settings on their computer is a common tactic used in social engineering attacks, specifically known as "social engineering scams" or "phishing scams." The purpose of these scams is to deceive and manipulate users into taking actions that compromise their computer's security or reveal sensitive information.

The false warning may come in the form of a pop-up message, an email, or a phone call, claiming to be from a legitimate organization or authority figure. The warning often uses urgency, fear, or a sense of importance to convince users to bypass security measures, disclose personal information, download malicious software, or change security settings that ultimately expose their computer to risks.

It is crucial for users to be vigilant and verify the authenticity of any warnings or requests they receive, especially if they seem suspicious or attempt to prompt immediate actions without proper verification.

thank you

some sites on the internet have the same ip address

Answers

Yes, it is possible for multiple websites to share the same IP address through shared hosting.

What is the purpose of shared hosting in web hosting services?

Yes, it is possible for multiple websites to have the same IP address.

This is because of a technology called shared hosting, where multiple websites are hosted on the same server and share the same IP address.

The web server uses different domain names or URLs to distinguish between the websites and deliver the requested content to the correct website visitor.

This allows hosting providers to optimize server resources and reduce costs.

Learn more about possible

brainly.com/question/30584221

#SPJ11

Challenge 1
Create a flowchart that takes two integer values from a user and evaluates and displays which one is the smallest value.

Challenge 2
Create a flowchart that asks the user to guess a random number populated by the program between 1 and 100. Use a logic flow arrow to create a loop that returns the user back into the program to continue guessing.

Challenge 3
Create a flowchart that asks the user for a number 10 separate times and adds all the numbers together. At the end, have the program display the sum.

Answers

Using the knowledge in computational language in python it is possible to write a code that create a flowchart that asks the user to guess a random number populated by the program between 1 and 100

Writting the code:

import random

def main():

randomNumber = random.randint(0,100)

count =0

while True:

guess = input("Guess?")

if(guess == randomNumber):

count = count+1

print "Congratulations found guessed correct number and number of guesses are ",count

break

elif guess >100 or guess <0:

print "Input should be in between 0 and 100"

elif guess > randomNumber:

count = count+1

print "Too high, try again."

elif guess < randomNumber:

count = count+1

print "Too low, try again."

if __name__=='__main__':

main()

See more about python at brainly.com/question/16757242

#SPJ1

Challenge 1Create a flowchart that takes two integer values from a user and evaluates and displays which

i need help with computer science
im on Write Password Evaluator

Answers

Answer: Password Evaluator is designed to examine passwords and tentative passwords to look for dictionary words and patterns that a password cracking tool might exploit. It looks for reversed, rotated, keyboard shifted, truncated, dropped letters, substituted characters and other variations on dictionary words both singly and in many combinations.

Explanation:

When first designing an app, all of the folldwing are important EXCEPT
A. debugging
B. determining how a user would interact with the app.
C. determining the purpose of the app
D. identifying the target audience

Answers

Answer:

B

Explanation:

Determining how the user could interact with the app varies person to person, the others are essential to creating apps though.

working on a python assignment, not sure what i did wrong can anyone help?

working on a python assignment, not sure what i did wrong can anyone help?

Answers

Answer:

Explanation:

line 13 should be changed to:

print(“Item 1: “ + item1 + “ - $” + str(float(const1)))

You cannot concatenate a string to float type.

Please interpret the below results of Regression, Anova & Coefficients.

H1: There is a significant relationship between sales training and salesforce performance.

H2: There is a significant relationship between training program approaches and salesforce performance.

Answers

The results of the regression, ANOVA, and coefficients analysis suggest that there is a significant relationship between sales training and salesforce performance (H1), as well as between training program approaches and salesforce performance (H2).

The regression analysis indicates that there is a significant relationship between the independent variable (sales training or training program approaches) and the dependent variable (salesforce performance). The ANOVA results suggest that there is a statistically significant difference between the groups being compared, indicating that the independent variable has an effect on the dependent variable. Finally, the coefficients analysis provides information on the strength and direction of the relationship between the variables.Overall, these results support the hypotheses that there is a significant relationship between sales training and training program approaches and salesforce performance. This information can be used to make informed decisions about how to improve sales performance through effective training programs.

I'm happy to help you interpret the results of Regression, Anova, and Coefficients related to your hypotheses.  To determine if there is a significant relationship between the variables in H1 and H2, you need to look at the p-values of the coefficients in the regression analysis. If the p-values are less than 0.05, it indicates a significant relationship.
Perform a regression analysis using sales training and training program approaches as independent variables, and salesforce performance as the dependent variable. Check the p-values of the coefficients for sales training and training program approaches in the regression results.Interpret the results for each hypothesis:- For H1: If the p-value for the sales training coefficient is less than 0.05, it suggests a significant relationship between sales training and salesforce performance. Otherwise, there is no significant relationship. For H2: If the p-value for the training program approaches coefficient is less than 0.05, it indicates a significant relationship between training program approaches and salesforce performance. Otherwise, there is no significant relationship.Remember to include the actual p-values and results in your interpretation.

To know more about  training program visit:

https://brainly.com/question/29561931

#SPJ11

which of the following can prolong the life of a computer and conserve resources?

Answers

Practices such as power management, regular maintenance, proper ventilation, surge protection, software optimization, and data management can prolong the life of a computer and conserve resources.

There are several ways to achieve this. One way is by keeping the computer clean and free from dust. Dust can clog up the fans and cause overheating, which can damage the internal components. Another way is to regularly update the computer's software and operating system. Software updates often include bug fixes and security patches, which can help improve the computer's performance and protect it from malware. Additionally, using power-saving settings and turning off the computer when not in use can help conserve energy and prolong battery life.

Lastly, avoiding excessive multitasking and closing unnecessary programs can also help conserve resources and improve the computer's performance.

Learn more about conserve resources: https://brainly.com/question/4722723

#SPJ11

Other Questions
. A histogram is better for _____________ data and a frequency polygon is better for ________data. a. discrete data, continuous data b. continuous data, discrete data c. neither a or b are correct d. both a and b are correct The sum of twice a number and 15 is 9 In square inches, what is the area of the composite shape?**DO NOT INCLUDE LABELS IN YOUR ANSWER!8 in.X8 in. Which equation has the steepest graph?a) y = 8x - 6b) y = 3x + 7c) y = -9x - 1d) y = 42 x + 1030 POINTS!plz i need help ASAP why don't we always feel earthquakes? what is brainliest from the word brain How does smoking cause bladder cancer? Write a concise answer to this question using scientific language effectively Please help me find the answers to these questions, I dont understand how to get through the process to then be able to answer the questions Caravans in the Sun Caravans in the Sun is a family-owned business producing mobile homes, static caravans and motorhomes in the UK. In 2001, CITS opened using cost-plus (mark-up) pricing and the homes were priced in the low to mid-range. They were typically purchased by retailers that soid their products to people wanting a holiday home in the UK without the costs associated with owning a property. In 2017, Clive Key, son of the founder, created a new strategy. He re-branded the CiTS homes for a niche premium market and did the following: - CITS stopped using cost-plus (mark-up) pricing and began charging much higher prices. - CITS opened a showground in the Midlands, UK, and began to sell directly to customers at its showground instead of through retailers. - Regular promotional events were held at its showground. At these events, mobile home experts would promote CiTs homes by creating an elegant experience based on a luxurious culture of living in a lodge moble home in a delune location rather than traditional homes. It often used local chocolatiers, wineries and chefs to create an event, hosted in and around mobile homes, to show the flexibility and luxury that is often not associated with this style of living. CITS's physical evidence in its marketing mix became much more important. However, CITS has recently faced intense competition with new, less expensive manufacturers, and sales have fallen. Local and overseas competitors have started using estate agents and retailers to help their sales, with many homes being sold to people wanting an extra space on their own land in addition to their houses rather than an alternative to their traditional "brick and mortar homes'. CrTs conducted secondary market research about other possible markets for its premium lodge mobile homes. The research suggested that other possible markets for high-quality lodge homes, chalets and log homes, similar to the premium range at Crrs, exist. As a result, CiTs is considering two new options to increase sales and, in order to maintain its brand image, is not considering changing its pricing strategies: - Option 1: open a business-to-consumer (B2C) e-commerce store that allows consumers to do a virtual tour of the chalets and mobile homes using VR. They can choose their own home, do a virtual tour of the home and location, and pay a deposit online. - Option 2: sell CiTS chalets to campsites and hotels for "glamping" options. (a) In the context of the case study, define the term cost-plus (mark-up) pricing. [2] (b) With reference to CITS, briefly outline the difference between a B2C and B2B market. [4] (c) Suggest two communication or promotional strategies that CITS might consider to counter the increased competition, (d) Discuss, with justification, which of Option 1 and Option 2 would be most likely to offer sustainable competitive advantage. [10] Total for Question 2: [20 Marks] the us senate has 100 members all democrat or republicans recently there were 12 more democrats than republicans how many senator from each political party Which graph represents 3x2 + 3y2 - 48x + 60y + 372 = 0? A square plot of land has an area of 250,000 square feet. what's the length of one side of the plot? Identify the legal concern that is common to both Trump v. Hawaii(2017) and Baker v. Carr (1962) sentences with this words please Indicate whether each statement describes a multiple-step income statement or a single-step income statement 1. Does not separately report income from operations 2 Does not separate revenues and gains into operating or nonoperating 3. Separates revenues and gains into operating or nonoperating Does not separate expenses and losses into operating or nonoperating Single-step income statement Single-step income statement Multiple-step income statement Single-step income statement U 4 help once again in math :/ Two conflicting groups who share the same negative views of one another demonstrate. This passage indicates how important ___is for this Native American leader What is the algebraic expression for the following word phrase: the difference between 17m and 3?A. 17m + 3B. 17m 3C. 17m 3D. 17m - 3Help please What number could replace x to make a true statement?2/3 < x/8 < 7/8