Answer:
In dynamic scoping the current block is searched by the compiler and then all calling functions consecutively e.g. if a function a() calls a separately defined function b() then b() does have access to the local variables of a(). The visible variables with the name of the function in which it was defined are given below.
Explanation:
In main() function three integer type variables are declared: a,b,c
In fun1() three int type variables are declared/defined: b,c,d
In fun2() three int type variables are declared/defined: c,d,e
In fun3() three int type variables are declared/defined: d,e,f
a. Main calls fun1; fun1 calls fun2; fun2 calls fun3
Here the main() calls fun1() which calls fun2() and fun2() calls func3() . This means first the func3() executes, then fun2(), then fun1() and last main()
Visible Variable: d, e, f Defined in: fun3
Visible Variable: c Defined in: fun2 (the variables d and e of fun2
are not visible)
Visible Variable: b Defined in: fun1 ( c and d of func1 are hidden)
Visible Variable: a Defined in: main (b,c are hidden)
b. Main calls fun1; fun1 calls fun3
Here the main() calls fun1, fun1 calls fun3. This means the body of fun3 executes first, then of fun1 and then in last, of main()
Visible Variable: d, e, f Defined in: fun3
Visible Variable: b, c Defined in: fun1 (d not visible)
Visible Variable: a Defined in: main ( b and c not visible)
c. Main calls fun2; fun2 calls fun3; fun3 calls fun1
Here the main() calls fun2, fun2 calls fun3 and fun3 calls fun1. This means the body of fun1 executes first, then of fun3, then fun2 and in last, of main()
Visible Variable: b, c, d Defined in: fun1
Visible Variable: e, f Defined in: fun3 ( d not visible)
Visible Variable: a Defined in: main ( b and c not visible)
Here variables c, d and e of fun2 are not visible
d. Main calls fun3; fun3 calls fun1
Here the main() calls fun3, fun3 calls fun1. This means the body of fun1 executes first, then of fun3 and then in last, of main()
Visible Variable: b, c, d Defined in: fun1
Visible Variable: e, f Defined in: fun3 ( d not visible )
Visible Variable: a Defined in: main (b and c not visible)
e. Main calls fun1; fun1 calls fun3; fun3 calls fun2
Here the main() calls fun1, fun1 calls fun3 and fun3 calls fun2. This means the body of fun2 executes first, then of fun3, then of fun1 and then in last, of main()
Visible Variable: c, d, e Defined in: fun2
Visible Variable: f Defined in: fun3 ( d and e not visible)
Visible Variable: b Defined in: fun1 ( c and d not visible)
Visible Variable: a Defined in: main ( b and c not visible)
f. Main calls fun3; fun3 calls fun2; fun2 calls fun1
Here the main() calls fun3, fun3 calls fun2 and fun2 calls fun1. This means the body of fun1 executes first, then of fun2, then of fun3 and then in last, of main()
Visible Variable: b, c, d Defined in: fun1
Visible Variable: e Defined in: fun2
Visible Variable: f Defined in: fun3
Visible Variable: a Defined in: main
Declare a class named PatientData that contains two attributes named height_inches and weight_pounds. Sample output for the given program with inputs: 63 115 Patient data (before): 0 in, 0 lbs Patient data (after): 63 in, 115 lbs 1 Your solution goes here ' 2 1 test passed 4 patient PatientData () 5 print('Patient data (before):, end-' ') 6 print(patient.height_inches, 'in,, end=' ') 7 print(patient.weight_pounds, lbs') All tests passed 9 10 patient.height_inches = int(input()) 11 patient.weight_pounds = int(input()) 12 13 print('Patient data (after):', end-' ') 14 print (patient. height_inches, 'in,', end- ') 15 print(patient.weight_pounds, 'lbs') Run
Answer:
class PatientData(): #declaration of PatientData class
height_inches=0 #attribute of class is declared and initialized to 0
weight_pounds=0 #attribute of class is declared and initialized to 0
Explanation:
Here is the complete program:
#below is the class PatientData() that has two attributes height_inches and weight_pounds and both are initialized to 0
class PatientData():
height_inches=0
weight_pounds=0
patient = PatientData() #patient object is created of class PatientData
#below are the print statements that will be displayed on output screen to show that patient data before
print('Patient data (before):', end=' ')
print(patient.height_inches, 'in,', end=' ')
print(patient.weight_pounds, 'lbs')
#below print statement for taking the values height_inches and weight_pounds as input from user
patient.height_inches = int(input())
patient.weight_pounds = int(input())
#below are the print statements that will be displayed on output screen to show that patient data after with the values of height_inches and weight_pounds input by the user
print('Patient data (after):', end=' ')
print(patient.height_inches, 'in,', end=' ')
print(patient.weight_pounds, 'lbs')
Another way to write the solution is:
def __init__(self):
self.height_inches = 0
self.weight_pounds = 0
self keyword is the keyword which is used to easily access all the attributes i.e. height_inches and weight_pounds defined within a PatientData class.
__init__ is a constructor which is called when an instance is created from the PatientData, and access is required to initialize the attributes height_inches and weight_pounds of PatientData class.
The program along with its output is attached.
In this exercise we have to use the knowledge of computational language in python to describe a code, like this:
The code can be found in the attached image.
To make it easier the code can be found below as:
class PatientData():
height_inches=0
weight_pounds=0
patient = PatientData()
print('Patient data (before):', end=' ')
print(patient.height_inches, 'in,', end=' ')
print(patient.weight_pounds, 'lbs')
patient.height_inches = int(input())
patient.weight_pounds = int(input())
print('Patient data (after):', end=' ')
print(patient.height_inches, 'in,', end=' ')
print(patient.weight_pounds, 'lbs')
See more about python at brainly.com/question/26104476
Consider a bit stuffing framing method where the start of a frame is indicated by 6 consecutive ones, followed by 2 zeroes. What should be the bit stuffing rules at the transmitter? What should be the bit destuffing rules at the receiver? Fill in the blank to show what is the stream after bit stuffingWrite the rule for stuffing:Write the rule for destuffing:Assume the user data stream before bit stuffing is 011111100011111101. What is the stream after bit stuffing?
Answer:
Explanation:
Bit stuffing Framing Method
In the given situation, the beginning casing is shown by 6 sequential ones followed by 2 zeroes.
The beginning casings are generally known as the flags.which are utilized for demonstrating the beginning and end of the edges. Essentially utilized for the synchronization between the sender and the reciever.
Along these lines here the beginning and end banners are 11111100(this is on the grounds that the end banner is same as the beginning banner).
To enable us understand how this question plays out, let us understand the rule for Stuffing and De-stuffing .
The standard for stuffing is :
At whatever point there are 5 successive ones supplement one zero in the casing which is an information. The embedded zero piece is known as the stuffed bit.The principle reason behind stuffing somewhat after 5 back to back ones is to evade the distortion of information (data) as flag. If the reciever misconstrues the information as end banner then he would quit recieving the information where the entire information sent by the sender will be left and lost causing an error-prone information.
The rule for destuffing :
The standard/rule for destuffing is only inverse as stuffing. After recieving the bitstuffed information (data), at the reciever's end zero after each 5 continuous ones will be evacuated and the rest of the information will be considered as the genuine information.
In the given situation, the beginning casing is demonstrated by 6 back to back ones followed by 2 zeroes.
the beginning casings are normally known as the flags.which are utilized for showing the beginning and end of the edges. Essentially utilized for the synchronization between the sender and the receiver.
In this way here the beginning and end banners are 11111100(this is on the grounds that the end banner is same as the beginning banner).
data before bit stuffing is: 011111100011111101the stream after stuffing would be: 01111101000111101101where the bolded/underlined digits represents the stuffed bits
cheers i hope this helps
Which of the following statements is correct? Group of answer choices An object of type Employee can call the setProjectName method on itself. The Employee class's setDepartment method overrides the Programmer class's setDepartment method. An object of type Programmer can call the setDepartment method of the Employee class on itself. An object of type Employee can call the setDepartment method of the Programmer class on itself.
Answer:
An object of type Employee can call the setDepartment method of the Programmer class on itself
Explanation:
From what can be inferred above, the programmer class is a subclass of the employee class meaning that the programmer class inherits from the employee class by the code:
Public class Programmer extends Employee
This therefore means(such as in Java) that the programmer class now has access to the methods and attributes of the employee class, the superclass which was inherited from
Declare a struct named PatientData that contains two integer data members named heightInches and weightPounds. Sample output for the given program:Patient data: 63 in, 115 lbs#include using namespace std;/* Your solution goes here */int main() {PatientData lunaLovegood;lunaLovegood.heightInches = 63;lunaLovegood.weightPounds = 115;cout << "Patient data: "<< lunaLovegood.heightInches << " in, "<< lunaLovegood.weightPounds << " lbs" << endl;return 0;}
Answer:
struct PatientData{
int heightInches, weightPounds;
};
Explanation:
In order to declare the required struct in the question, you need to type the keyword struct, then the name of the struct - PatientData, opening curly brace, data members - int heightInches, weightPounds;, closing curly brace and a semicolon at the end.
Note that since the object - lunaLovegood, is declared in the main function, we do not need to declare it in the struct. However, if it was not declared in the main, then we would need to write lunaLovegood between the closing curly brace and the semicolon.
10. Which property is used to show the form in maximize state
a) Selection State b) Window State c) Mode d) Opening State
Answer:
windows state
Explanation:
the answer is windows state.
If a schema is not given, you may assume a table structure that makes sense in the context of the question. (using sql queries)
Find all Employee records containing the word "Joe", regardless of whether it was stored as JOE, Joe, or joe.
Answer:
The correct query is;
select * from EMPLOYEE where Employee_Name = 'JOE' or Employee_Name = 'Joe' or Employee_Name = 'joe';
where EMPLOYEE refer to the table name and type attribute name is Employee_Name
Explanation:
Here, the first thing we will do is to assume the name of the table.
Let’s assume the table name is EMPLOYEE, where the column i.e attribute from which we will be extracting our information is Employee_Name
The correct query to get the piece of information we are looking for will be;
select * from EMPLOYEE where Employee_Name = 'JOE' or Employee_Name = 'Joe' or Employee_Name = 'joe';
Question 16
Which of the following may not be used when securing a wireless connection? (select multiple answers where appropriate)
WEP
VPN tunnelling
Open Access Point
WPA2
WPA2
Nahan nah
Answer:
wpa2 wep
Explanation:
wpa2 wep multiple choices
Append newValue to the end of vector tempReadings. Ex: If newValue = 67, then tempReadings = {53, 57, 60} becomes {53, 57, 60, 67}.
#include
#include
using namespace std;
int main() {
vector tempReadings(3);
int newValue = 0;
unsigned int i = 0;
tempReadings.at(0) = 53;
tempReadings.at(1) = 57;
tempReadings.at(2) = 60;
newValue = 67;
/* Your solution goes here */
for (i = 0; i < tempReadings.size(); ++i) {
cout << tempReadings.at(i) << " ";
}
cout << endl;
return 0;
}
2.Remove the last element from vector ticketList.
#include
#include
using namespace std;
int main() {
vector ticketList(3);
unsigned int i = 0;
ticketList.at(0) = 5;
ticketList.at(1) = 100;
ticketList.at(2) = 12;
/* Your solution goes here */
for (i = 0; i < ticketList.size(); ++i) {
cout << ticketList.at(i) << " ";
}
cout << endl;
return 0;
}
3. Assign the size of vector sensorReadings to currentSize.
#include
#include
using namespace std;
int main() {
vector sensorReadings(4);
int currentSize = 0;
sensorReadings.resize(10);
/* Your solution goes here */
cout << "Number of elements: " << currentSize << endl;
return 0;
}
4. Write a statement to print "Last mpg reading: " followed by the value of mpgTracker's last element. End with newline. Ex: If mpgTracker = {17, 19, 20}, print:
Last mpg reading: 20
#include
#include
using namespace std;
int main() {
vector mpgTracker(3);
mpgTracker.at(0) = 17;
mpgTracker.at(1) = 19;
mpgTracker.at(2) = 20;
/* Your solution goes here */
return 0;}
Answer:
Following are the code to this question:
In question 1:
tempReadings.push_back(newValue); //using array that store value in at 3 position
In question 2:
ticketList.pop_back(); //defining ticketList that uses the pop_back method to remove last insert value
In question 3:
currentSize = sensorReadings.size(); /defining currentSize variable holds the sensorReadings size value
In question 4:
cout<<"Last mpg reading: "<<mpgTracker.at(mpgTracker.size()-1)<<endl;
//using mpgTracker array with at method that prints last element value
Explanation:
please find the attachment of the questions output:
In the first question, it uses the push_back method, which assigns the value in the third position, that is "53, 57, 60, and 67 "In the second question, It uses the pop_back method, which removes the last element, that is "5 and 100"In the third question, It uses the "currentSize" variable to holds the "sensorReadings" size value, which is "10".In the fourth question, It uses the mpgTracker array with the "at" method, which prints the last element value, which is "20".Using data from interviews with ESCO executives conducted in late 2012, this study examines the market size, growth forecasts, and industry trends in the United States for the ESCO sector.
Thus, It uses the "currentSize" variable to holds the "sensorReadings" size value, which is "10". In the fourth question, It uses the mpgTracker array with the "at" method, which prints the last element value, which is "20".
There are numerous types of gateways that can operate at various protocol layer depths.
Application layer gateways (ALGs) are also frequently used, albeit most frequently a gateway refers to a device that translates the physical and link layers. It is best to avoid the latter because it complicates deployments and is a frequent source of error.
Thus, Using data from interviews with Gateway executives conducted in late 2012, this study examines the market size, growth Esco size and industry trends in the United States for the Gateway.
Learn more about Gateway, refer to the link:
https://brainly.com/question/30167838
#SPJ6
Describe and compare imperative (C), functional (SML) and logic (Prolog) programming paradigms.
Answer:
Answered below
Explanation:
Imperative programming paradigm is a paradigm in which the programmer tells the machine how to change its state. It is divided into procedural programming, where programs are grouped as procedures, and object-oriented, where programs are grouped together with the properties they operate on.
Imperative paradigm is efficient, familiar and popular compared to others.
Functional programming paradigm implements all instructions as functions, in a mathematical sense. They take on an argument and return a single solution. The advantage of this, compared to other paradigms, is its abstraction and independence.
Logical programming, like functional programming, incorporates a declarative approach to problem solving. All known facts are first established before queries are made. Advantage of this paradigm is that programming steps are kept to a minimum.
3. Which property is used to select full Row of data grid view
a) Select Mode b) Mode Selection c) Selection Mode d) Mode Select
Answer:
I think a is correct answer.
In the three As of security, which part pertains to describing what the user account does or doesn't have access to
Answer:
Authorization
Explanation:
Describe how asymmetric encryption is used to send a message from User A to User B that assures data confidentiality, authentication, and integrity. Be specific as to the keys used and how they achieve the three goals.
Answer:
Find the explanation below.
Explanation:
Asymmetric encryption is a system of communication in technology between two parties where keys which are variable values coined by an algorithm are used to encrypt and decrypt the messages between the sender and receiver. The two types of keys used in this process are the public and private keys. The public keys can be used by anyone to encrypt messages which are then sent to the receiver who decrypts the message using his private keys. The private keys on the other hand are only shared by the person who first set up the key. In sending messages this way, the receiver's public key is gotten from a public directory, and the message encrypted by the sender. The receiver can then decrypt the message using his private keys. But if the message is encrypted using a private key, it is decrypted by the receiver with a public key.
The one-way nature of this style of communication ensures data integrity and confidentiality since users are not required to disclose their keys and only the two parties can access the message. The two end users also preserve the right to authenticate the keys. The transport layer security protocol makes use of asymmetric encryption.
Write a for loop to print all NUM_VALS elements of array hourlyTemp. Separate elements with a comma and space. Ex: If hourlyTemp = {90, 92, 94, 95}, print:
90, 92, 94, 95
Note that the last element is not followed by a comma, space, or newline.
#include
using namespace std;
int main() {
const int NUM_VALS = 4;
int hourlyTemp[NUM_VALS];
int i = 0;
hourlyTemp[0] = 90;
hourlyTemp[1] = 92;
hourlyTemp[2] = 94;
hourlyTemp[3] = 95;
/* Your solution goes here */
cout << endl;
return 0;
}
Answer:
string sep = "";
for (i = 0; i < NUM_VALS; i++) {
cout << sep << hourlyTemp[i];
sep = ", ";
}
Explanation:
Insert the snippet at the commented location.
With the absence of a join() method as found in other languages, it is always a hassle to suppress that separator comma from appearing at the beginning or the end of your output. This solution is nice since it doesn't require any magic flags to keep track of wether the first element was printed.
Which of the following is designed to help an organization continue to operate during and after a disruption?
a. incident response plan
b. business continuity plan
c. disaster recovery plan
d. risk mitigation plan
Answer:
d
Explanation:
cause people need a care for there incedents that not expected thats why people need help prevent from a risk to save people lives
Bar-code readers are typically used to track large numbers of inventory items, as in grocery store inventory and checkout, package tracking, warehouse inventory control, and zip code routing for postal mail.
A. True
B. False
Define a function readList with one parameter, the (string) name of a file to be read from. The file consists of integers, one per line. The function should return a list of the integers in the file.
Answer:
Here is the Python function readList:
def readList(filename): #function definition of readList that takes a filename as a parameter and returns a list of integers in the file
list = [] # declares an empty list
with open(filename, 'r') as infile: # opens the file in read mode by an object infile
lines = infile.readlines() # returns a list with each line in file as a list item
for line in lines: #loops through the list of each line
i = line[:-1] # removes new line break which is the last character of the list of line
list.append(i) # add each list item i.e. integers in the list
return list #returns the list of integers
#in order to check the working of the above function use the following function call and print statement to print the result on output screen
print(readList("file.txt")) #calls readList function by passing a file name to it
Explanation:
The program is well explained in the comments mentioned with each line of the code.
The program declares an empty list.
Then it opens the input file in read mode using the object infile.
Next it uses readLines method which returns a list with each line of the file as a list item.
Next the for loop iterates through each item of the file which is basically integer one per line
It adds each item of list i.e. each integers in a line to a list using append() method.
Then the function returns the list which is the list of integers in the file.
The program along with it output is attached. The file "file.txt" contains integers 1 to 8 one per line.
The policy that allows a transaction to commit even if it has modified some blocks that have not yet been written back to disk is called the __________ policy.
Answer:
No-force policy
Explanation:
The policy that allows a transaction to commit even if it has modified some blocks that have not yet been written back to disk is called the _NO-FORCE_ policy.
In data theory, the No-Force Policy is beneficial for the control of transaction. In this policy, when a transaction commits, changes that are made are not required to be written to disk in place. The changes recorded are preserved in order to make transaction durable. The recorded changes must be preserved at commit time.
How to use the AI System ?
ANSWER:
· New artificial intelligence systems are being developed to help teachers administer more effective testing that could uncover some of these often-hidden conditions. Once they can be properly identified, educators can tap into the resources available for a learning disability. Students can use AI to give reliable feedback.
Write the Java code for the calculareDiameter method.
Answer:
* Program to find diameter, circumference and area of circle.
*/
import java.util.Scanner;
public class Circle {
public static void main(String[] args) {
// Declare constant for PI
final double PI = 3.141592653;
Scanner in = new Scanner(System.in);
/* Input radius of circle from user. */
System.out.println("Please enter radius of the circle : ");
int r = in.nextInt();
/* Calculate diameter, circumference and area. */
int d = 2 * r;
double circumference = 2 * PI * r;
double area = PI * r * r;
/* Print diameter, circumference and area of circle. */
System.out.println("Diameter of circle is : " + d);
System.out.println("Circumference of circle is : " + circumference);
System.out.println("Area of circle is : " + area);
}
}
The penalties for ignoring the requirements for protecting classified information when using social networking services are _________________ when using other media and methods of dissemination.
The penalties for ignoring the requirements for protecting classified information when using social networking services are the same when using other media and methods of dissemination.
The penalties are the same because it does not matter what the medium used, the effect is that classified information and confidential details have been left unguarded and exposed.
When in hold of such information, it is not okay to leave it unguarded or exposed. A person who is found guilty of disclosure of classified materials would face sanctions such as:
They would be given criminal sanctionsThey would face administrative sanctionsThey would also face civil litigationsRead more on https://brainly.com/question/17207229?referrer=searchResults
The primary function of a web server is to store, process and deliver web pages to the clients. You are required to clearly identify the purpose and relationships between communication protocols, web server hardware, web server software with regards to designing, publishing and accessing a website.
Answer:
The main job of a web server is to display website content through storing, processing and delivering webpages to users. Besides HTTP, web servers also support SMTP (Simple Mail Transfer Protocol) and FTP (File Transfer Protocol), used for email, file transfer and storage.
Explanation:
If it helps you mark me as a brainleast
Write a method named lastIndexOf that accepts an array of integers and an * integer value as its parameters and returns the last index at which the * value occurs in the array. The method should return -1 if the value is not * found.
Answer:
The method is as follows:
public static int lastIndexOf(int [] numbers, int num){
int lastIndex = numbers[0];
for(int i =0; i<numbers.length;i+=num){
lastIndex = numbers[i];
}
return lastIndex;
}
Explanation:
This defines the method
public static int lastIndexOf(int [] numbers, int num){
This initializes the lastIndex to the first element of the array
int lastIndex = numbers[0];
This iterates through every "num" element of the array
for(int i =0; i<numbers.length;i+=num){
This gets the current index... until the last
lastIndex = numbers[i]; }
This returns the last
return lastIndex; }
Java there are n coins each showing either heads or tails we would like all the coins to form a sequence of alternating heads and tails what is the minimum number of coins that must be reversed to achieve this
El número mínimo de monedas que se deben invertir para lograr esto:
45 moas
An organization is building a new customer services team, and the manager needs to keep the team focused on customer issues and minimize distractions. The users have a specific set of tools installed, which they must use to perform their duties. Other tools are not permitted for compliance and tracking purposes. Team members have access to the Internet for product lookups and to research customer issues. Which of the following should a security engineer employ to fulfill the requirements for the manager?a. Install a web application firewallb. Install HIPS on the team's workstations.c. implement containerization on the workstationsd. Configure whitelisting for the team
Answer:
a
Explanation:
because they need to protect the organization's information
If our HMap implementation is used (load factor of 75% and an initial capacity of 1,000), how many times is the enlarge method called if the number of unique entries put into the map is:_______
a. 100
b. 750
c. 2,000
d. 10,000
e. 100,000
Answer:
A) for 100 : < 1 times
b) for 750 : < 1 times
c) For 2000 = 1 time
D) for 10000 = 4 times
E) for 100000 = 7 times
Explanation:
Given data:
load factor = 75%
initial capacity = 1000
The number of times the enlarge method will be called for a unique number of entries would be 2 times the initial capacity ( 1000 ) because the load factor = 75% = 0.75
A) for 100 : < 1 times
b) for 750 : < 1 times
C) For 2000
= initial capacity * 2 = 2000 ( 1 time )
D) for 10000
= 1000 * 2 *2 *2*2 = 16000 ( 4 times )
to make it 10000 we have to add another 2000 which will make the number of times = 4 times
E)for 100000
= 1000*2*2*2*2*2*2*2= 128000 ( 7 times )
unique entry of 100000 is contained in 7 times
Discuss the different methods of authentication supported between Microsoft’s Web server (Internet Information Services) and the browsers in common use at your organization. Cover both basic authentication and Microsoft’s challenge-response scheme.
Answer:
Answered below
Explanation:
The Microsoft web server (Internet Information Services) supports the following authentication methods;
1) Basic authentication: This method uses basic authentication to restrict access to files on NTFS-formatted web servers. Access is based on user ID and password.
2) Digest authentication, which uses a challenge-response mechanism where passwords are sent in encrypted formats.
3) Anonymous authentication: In this method, the IIS creates IUSR-computerName account, to authenticate anonymous users.
4) Windows integration uses windows domain accounts for access.
5) .Net passport authentication provides users with security-enhanced access to .Net websites and services.
6) Client certificate mapping where a mapping is created between a certificate and a user account.
define a computer with its Proper meaning
Answer:
computer is defined as a electronic machine which gives us meaningful result as fast as possible
Answer:
As known a computer can be defined as the use of computers to store, retrieve, transmit and manipulate data or information.
Discuss the 21 st century competencies or skills required in the information society and 4 ways you can apply it during supported teaching on schools
Answer:
Life skills, learning skills, The literacy skills
Explanation:
There are different type of skills that are required in schools, educational societies, organizations. Now these students need more attention to focus on their carrier. There are different of skills such as:
There are another three skills like
The learning skillsThe literacy skillsThe life skills. CreativityCollaborationCommunicationMedia literacyLeadershipFlexibilityInitiativeSocial skillsProductivityCritical thinking.These are some skills that help students that keep up the lightening -pace in todays modern society. All skills are unique and used differently by students.
Children walking on the sidewalk, a person sitting in a parked car, and a parking lot with vehicles
entering and exiting indicate a
A. construction zone.
B. railroad crossing.
C. school zone.
D. none of the above
Answer:
Explanation:
Hello friend !!!!!!!!!!!!
The answer is school zone
Hope this helps
plz mark as brainliest!!!!!!!
Children walking on the sidewalk, a person sitting in a parked car, and a parking lot with vehicles entering and exiting indicate a school zone (Option C).
A school zone is a specific urban area where can be found a school and/or is near a school. A school zone shows an accessible parking area for the use of individuals (e.g. parents) holding valid accessible parking passes.Moreover, a school zone sign refers to a warning signal because children cannot be as alert as adults when they cross a road.In conclusion, children walking on the sidewalk, a person sitting in a parked car, and a parking lot with vehicles entering and exiting indicate a school zone (Option C).
Learn more in:
https://brainly.com/question/8019372
Implement a recursive method named power that takes 2 integer parameters named base and expo. The method will return the base raised to the power of expo.
Answer:
def power(base, expo):
if expo == 0:
return 1
else:
return base * power(base, expo-1)
Explanation:
*The code is in Python.
Create a method called power that takes base and expo as parameters
Check if the expo is equal to 0. If it is return 1 (This is our base case for the method, where it stops. This way our method will call itself "expo" times). If expo is not 0, return base * power(base, expo-1). (Call the method itself, decrease the expo by 1 in each call and multiply the base)