How can we use variables to store information in our programs?

Answers

Answer 1
Computer programs use variables to store information.
...
To make a simple program that displays your name, you could program the computer to:
Ask for your name.
Store that answer as a variable called 'YourName'.
Display “Hello” and the string stored in the variable called 'YourName'

Related Questions

For Questions 1-4, consider the following code:

def mystery1(x):
return x + 2

def mystery2(a, b = 7):
return a + b

#MAIN
n = int(input("Enter a number:"))
ans = mystery1(n) * 2 + mystery2 (n * 3)
print(ans)


What is output when the user enters 9?

Answers

Answer:

9 would be entered as a parameter n of class mystery1 and return 9 + 2 = 11 and then 11 * 2 = 22, PLUS,

mystery2 new parameter is 9 * 3 = 27, then 27 + 7 = 34 returned

FINALLY, ans = 22 + 34

ans = 56 printed as output

list the steps to create a new folder in windows

Answers

Navigate to where you want to create the new folder, and click New Folder. Type the name of your folder, and press Enter. To save a document to the new folder, open the document, and click File > Save As, and then browse to the new folder, and click Save.

Which Microsoft technology provides seamless intranet connectivity to client computers when they are connected to the Internet?

Answers

Answer:

b. Wi-Fi Direct

Explanation:

These are the options for the question;

a. Wi-Fi Protected Access

b. Wi-Fi Direct

c. Wired Equivalent Privacy

d. Internet Sharing

Wi-Fi Direct can be regarded as Wi-Fi standard that gives enablements for two Wi-Fi connections to have a direct Wi-Fi connection even though there is no intermediary wireless access point or router. It is a peer-to-peer wireless connections. It should be noted that Wi-Fi Direct is one of the Microsoft technology which provides seamless intranet connectivity to client computers when they are connected to the Internet. To use Wi-Fi direct especially on Android, one can go to "setting" and select WiFi direct, it will scan the available device automatically then connect with the preferred device, the receiving device will get invitation to connect, then if "accept" is tap then the network will start.

The coding system that has just two characters is called:

a
binary
b
dual.
c
basic.
d
double.

Answers

Answer:

A. Binary

Definition:

Pertaining to a number system that has just two unique digits 0 and 1. - binary code

You are adding more features to a linear regression model and hope they will improve your model. If you add an important feature, the model may result in.
1. Increase in R-square
2. Decrease in R-square
A) Only 1 is correct
B) Only 2 is correct
C) Either 1 or 2
D) None of these

Answers

Answer:

The answer is "Option A".

Explanation:

Add extra functionality, otherwise, it increases the R-square value, which is defined in the following points:      

To incorporate essential elements, R-square is explicitly promoted. It Increases the R-square value, which is an additional feature. It removes the features, which provide the value of the reduce R-square. After incorporating the additional features is used as the model, which is R-square, which is never reduced.

Question #6
Fill in the Blank
You designed a program to create a username using the first three letters from the first name and the first four letters of the last na
name.
You are testing your username program again for a user whose name is Paula Mano.
The output should be
______.

Answers

Answer:

PauMano

Explanation:

those are the first 3 and 4 letters of the names

What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records?

Answers

Answer:

Your user ID and password.

Explanation:

The user Id and password must be protected because when it is exposed to a third party then they can get access to information, data, to things they are not supposed to.

The user Id and password is provided as an authentication measure for one to be able to gain access to a computer system, network or files. It is what grants access to online files and record as it is the case here. It has to be protected for the sake of privacy.

Q Basic program write a program in Q Basic to find the cost of 10 pens when the cost of 15 pens is 75 use unitary method to find calculate the cost of one pen calculate the print of cost of 10 pen computer answer​

Answers

give the function of cpu

4.9 Code Practice: Question 4 Edhisive

Write a program that asks the user to enter ten temperatures and then finds the sum. The input temperatures should allow for decimal values.

Sample Run
Enter Temperature: 27.6
Enter Temperature: 29.5
Enter Temperature: 35
Enter Temperature: 45.5
Enter Temperature: 54
Enter Temperature: 64.4
Enter Temperature: 69
Enter Temperature: 68
Enter Temperature: 61.3
Enter Temperature: 50
Sum = 504.3

Answers

i = 0

total = 0

while i < 10:

   temp = float(input("Enter Temperature: "))

   total += temp

   i += 1

print("Sum: {}".format(total))

I wrote my code in python 3.8. I hope this helps!

The program accepts 10 temperature inputs from the user, and takes the sum of the inputs gives before displaying the total sum of the temperature. The program is written in python 3 ;

temp_count = 0

#initialize the number of temperature inputs given by the user and assign to temp_count variable

sum = 0

#initialize the sum of the temperature inputs given

while(temp_count < 10):

#loop allows 10 inputs from the user

values = eval(input('Enter temperature : '))

#prompts user to input temperature values

sum+= values

#adds the inputted values to sum

temp_count+=1

#increases count of input by 1

print('sum of temperature : ', sum)

#displays the total sum

Learn more :https://brainly.com/question/18253379

Write a function named findmax()that finds and displays the maximum values in a two dimensional array of integers. The array should be declared as a 10 row by 15 column array of integers in main()and populated with random numbers between 0 and 100.

Answers

Answer:

import java.util.*;

public class Main

{

public static void main(String[] args) {

    Random r = new Random();

    int[][] numbers = new int[10][15];

   

    for (int i=0; i<10; i++){

        for (int j=0; j<15; j++){

            numbers[i][j] = new Random().nextInt(101);

        }

    }

   

    for (int i=0; i<10; i++){

        for (int j=0; j<15; j++){

            System.out.print(numbers[i][j] + " ");

        }

        System.out.println();

    }

   

    findmax(numbers);

}

public static void findmax(int[][] numbers){

    int max = numbers[0][0];

   

    for (int i=0; i<10; i++){

        for (int j=0; j<15; j++){

            if(numbers[i][j] > max)

                max = numbers[i][j];

        }

    }

    System.out.println("The max is " + max);

}

}

Explanation:

*The code is in Java.

Create a function called findmax() that takes one parameter, numbers array

Inside the function:

Initialize the max as first number in the array

Create a nested for loop that iterates through the array. Inside the second for loop, check if a number is greater than the max. If it is set it as the new max

When the loop is done, print the max

Inside the main:

Initialize a 2D array called numbers

Create a nested for loop that sets the random numbers to the numbers array. Note that to generate random integers, nextInt() function in the Random class is used

Create another nested for loop that displays the content of the numbers array

Call the findmax() function passing the numbers array as a parameter

Are Dogs are better than video games?

Answers

sometimes bc dogs are very lovey but video games also have there moments

Answer:

In some cases yes.

Explanation:

Some days I really enjoy my video games and other days I enjoy being with my dog but sometimes they are annoying especially if they have way more energy than you

I need help plz it’s python

Answers

Answer:

The output of the first question would be 9. And the answer the second question is 10.

what is the art of prolonging the life of the food items that are available​

Answers

Answer:

Food preservation.

Explanation:

Food preservation can be defined as an art that typically deals with the process of preventing food spoilage by reducing or mitigating the growth of microorganisms and other external factors while maintaining the nutritional value, flavor and texture of the food.

Some of the factors that causes food spoilage include microorganisms (bacteria, yeast and molds), temperature, moisture content, oxidation etc.

Hence, food preservation is the art of prolonging the life of the food items that are available.

Basically, there are physical, chemical and biological methods which can be used to prolong the life of food items and thus sustaining the edibility and nutritional value of foods. These methods are;

1. Freezing.

2. Pasteurization.

3. Drying.

4. Retorting.

5. Thermal sterilization.

6. Fermentation.

7. Irradiation.

Let g(x) = cos(x/2) - 3x. Let f(x) = 2x + 5. What is g(f(x))?​

Answers

Answer:

f = 2

Explanation:

g(x) = cos(x/2) - 3x=w where w=-3.5 or -1 or -38.5

13– (13/2)-3*13=-3.5 (1st d value of g(x))

-1-(-1/2)-3*(-1)=-1 (the 2nd possible value)

g(x) = cos(x/2) - 3x=-1 where the first x=13 and the 2nd one=-1

where the first x=-1 and the 2nd one=-38.5 (the 3rd value)

g(x) = cos(x/2) - 3x)=0 where cos(x/2=-3.5

g(f(x)) = cos(f(x)/2) - 3 aka 0.5 f(x) = cos(2x+5 aka 7x) (x/2 - 3 =aka -1 );

(2x+5) = 7x by definition but the equation has to be set to 7 to find x)

(7x/2 -6x=0) -7 on both sides

x/2–6x=-7

x/2= 13

26/2=x

x=13 (these values are set up for 2x+5=7.

13-(-7)=-7

13-6+-1=-7

the 2nd x=-1

gfx=cos*2*x i.e cos*2*13 or cos*2*-1

cos*2*13=26

cos*2*(-1)=-1

cos=1

(cos*2*13)=the 1st gfx value=26 basically.

( cos*2*(-13)=-26 (the 2nd gfx value)

cos*2*(-1)=-`1 (the 3rd gfx value)

f=2

hope this helped!

Write a program that contains three methods:

Method max (int x, int y, int z) returns the maximum value of three integer values.
Method min (int X, int y, int z) returns the minimum value of three integer values.
Method average (int x, int y, int z) returns the average of three integer values.

Answers

Answer:

#include <stdio.h>//defining header file

int max (int x, int y, int z) //defining a method max that hold three parameters

{

   if(x>=y && x>=z)//defining if block that checks x is greater then y and x is greater then z

   {

       return x;//return the value x

   }

   else if(y>z)//defining else if block it check y is greater then z

   {

       return y;//return the value y

   }

   else//else block

   {

       return z;//return the value z

   }

}

int min (int x, int y, int z) //defining a method max that holds three parameters

{

if(x<=y && x<=z) //defining if block that check x value is less then equal to y and less then equal to z

{

return x;//return the value of x

}

if(y<=x && y<=z) //defining if block that check y value is less then equal to x and less then equal to z

{

return y;//return the value of y

}

if(z<=x && z<=x)//defining if block that check z value is less then equal to x  

{

return z;//return the value of z

}

return x;//return the value of z  

}

int average (int x, int y, int z) //defining average method that take three parameters

{

int avg= (x+y+z)/3;//defining integer variable avg that calculate the average

return avg;//return avg value

}

int main()//defining main method

{

   int x,y,z;//defining integer variable

   printf("Enter first value: ");//print message

   scanf("%d",&x);//input value from the user end

   printf("Enter Second value: ");//print message

   scanf("%d",&y);//input value from the user end

   printf("Enter third value: ");//print message

   scanf("%d",&z);//input value from the user end

   printf("The maximum value is: %d\n", max(x,y,z));//calling the method max

   printf("The minimum value is: %d\n", min(x,y,z));//calling the method min

   printf("The average value is: %d\n", average(x,y,z));//calling the method average

   return 0;

}

Output:

Enter first value: 45

Enter Second value: 35

Enter third value: 10

The maximum value is: 45

The minimum value is: 10

The average value is: 30

Explanation:

In the above-given code, three methods "max, min, and average" is declared that holds three integer variable "x,y, and z" as a parameter and all the method work as their respective name.

In the max method, it uses a conditional statement to find the highest number among them.In the min method, it also uses the conditional statement to find the minimum value from them.In the average method, it defined an integer variable "avg" that holds the average value of the given parameter variable.In the main method, three variable is defined that inputs the value from the user end and passes to the method and print its value.      

Which fixed expense would be most difficult to change if money is needed for car payments? rent electricity cable Internet

Answers

Answer: rent

Explanation: just took the quiz on edge

Answer:

rent

Explanation:

took the quiz

A(n) ___________ analyzes traffic patterns and compares them to known patterns of malicious behavior.a. Intrusion prevention system b. intrusion detection system c. defense-in-depth strategy d. quantitative risk assessment

Answers

Answer:b. intrusion detection system

Explanation:

An intrusion detection system (IDS)  helps to  alert  service administrators   to detect suspicious or malicious activity  by monitoring and analyzing  specific patterns to network traffic. Most times, the IDS may be configured  to  respond to suspicious malicious traffic by  blocking the cyber attacker making  such IP address unable to access that particular  network.

An intrusion detection system (IDS)  can be either a Host Based Intrusion Detection Systems (HIDS) or a Network Based Intrusion Detection Systems (NIDS) depending on preference by the user.

It is therefore necessary for  businesses who require high level of security   to adopt good and effective  intrusion detection systems so  that the communication of information from businesses to businesses  can be safeguarded and secure from cyber attacks.

An uniterruptible power supply

Answers

Answer:

An uninterruptible power supply  is an electrical apparatus that provides emergency power to a load when the input power source or mains power fails.

Explanation:

Your welcome :) PLZ mark brainliest

Nathaniel wanted to buy a microphone. He went to an electronics store and was told that there are actually two types of microphones that he can choose from. What are the two types of microphones that Nathaniel can choose from?
Nathaniel can choose either of two types of microphone: dynamic or ____ .

Answers

Answer:

Condenser Microphone

Explanation:

google

Feel free to make me brainlyest!

Answer: condenser

Explanation:

i took the test and got it correct

Write a statement that calls a function named IncreaseItemQty, passing the variable addStock. Assign mugInfo with the value returned by IncreaseItemQty.

Answers

Answer:

Explanation:

#include <stdio.h>

#include <string.h>

typedef struct ProductInfo_struct {

char itemName[30];

int itemQty;

} ProductInfo;

ProductInfo IncreaseItemQty (ProductInfo productToStock, int increaseValue) {

productToStock.itemQty = productToStock.itemQty + increaseValue;

return productToStock;

}

int main(void) {

ProductInfo mugInfo;

int addStock;

addStock = 10;

scanf("%s", mugInfo.itemName);

scanf("%d", &mugInfo.itemQty);

**** /* Your solution goes here */ ****

printf("Name: %s, stock: %d\n", mugInfo.itemName, mugInfo.itemQty);

return 0;

}

Answer:

#include <stdio.h>

typedef struct ProductInfo_struct {

  char itemName[50];

  int itemQty;

} ProductInfo;

ProductInfo AddToStock(ProductInfo productToStock, int increaseValue) {

  productToStock.itemQty = productToStock.itemQty + increaseValue;

  return productToStock;

}

int main(void) {

  ProductInfo mugInfo;

  int addStock;

  scanf("%s", mugInfo.itemName);

  scanf("%d", &mugInfo.itemQty);

  scanf("%d", &addStock);

mugInfo = AddToStock(mugInfo, addStock);

  printf("Name: %s, stock: %d\n", mugInfo.itemName, mugInfo.itemQty);

  return 0;

}

Explanation:

mugInfo holds both an int and a char

9.2.2: Output formatting: Printing a maximum number of digits. Write a single statement that prints outsideTemperature with 4 digits. End with newline. Sample output with input 103.45632: 103.5

Answers

Answer:

The single print statement that does the required in python is:

print("%.4g" % outsideTemperature)

Explanation:

The full program is as follows:

The first line prompts user for input

outsideTemperature = float(input("Outside Temperature: "))

To print significant figures, we make use of g formats. And this is implemented as follows:

print("%.4g" % outsideTemperature)

The above prints 4 significant digits of outsideTemperature

For other significant figures, simply change the 4 to another number

One lap around a standard high-school running track is exactly 0.25 miles. Write the function miles_to_laps() that takes a number of miles as an argument and returns the number of laps. Complete the program to output the number of laps. Output each floating-point value with two digits after the decimal point, which can be achieved as follows: print('{:.2f}'.format(your_value))

Ex: If the input is: 2.2 the output is: 8.80 Your program must define and call the following function: def miles_to_laps(user_miles)

Answers

Answer:

def miles_to_laps(user_miles):

   laps = user_miles / 0.25

   

   return laps

 

miles = float(input("Enter number of miles: "))

print('{:.2f}'.format(miles_to_laps(miles)))

Explanation:

Create a function named miles_to_laps that takes one parameter, user_miles

Inside the function, calculate the number of laps, divide the user_miles by 0.25 (Since it is stated that one lap is 0.25 miles). Return the laps

Ask the user to enter the number of miles

Call the function with that input and print the result in required format

how can i fix my code so that a teepee is properly formed? here is what i currently have (my output is uploaded as an image):

public static void teepee(int a){
for(int i=a; i>0; i--){
for(int j=a; j>0; j--){
System.out.print(" ");
}
System.out.print("/");
for(int k=i; k System.out.print(" ");
}
System.out.println("\\");
}
}

Answers

We are not sending them any other one tryin was there to a point that they had been doing the work for the first

What stage is the most inner part of the web architecture where data such as, customer names, addresses, account numbers, and credit card info, is stored

Answers

Answer:

Database

Explanation:

A website or web application is a page or a collection of pages addressing the same information on the internet. Web pages and the whole web application is made by a web developer using tools like HTML, CSS, Javascript, Flask, react.js, etc.

All websites or applications require a fast, flexible but secure source of storage to hold information. This storage is called a database. Examples of databases are relational and non-relational databases.

Javier wants to copy the last four digits of ID numbers from cell A2. Order the steps for the formula.
4)
RIGHT
(A2
Intro

Answers

Answer:=, RIGHT, (A2 (,) 4)

Explanation:

Yes

Answer:

=

Right

(A2

,

4)

Explanation: I got it right

typing which capitals and exclamation points in an email is an example of

Answers

it's an example of a poorly written email, it looks like somebody is angry and yelling at you, these types of emails can be described as a poor etiquette.

Your company has hired a group of new network techs, and you've been tasked to do their training session on networking standards organizations. Write a brief essay detailing the IEEE and its various committees.

Answers

Answer:

IEEE stands for  Institute of Electrical and Electronics Engineers.

Explanation:

The  Institute of Electrical and Electronics Engineers or more popularly known as the IEEE is a professional body that is associated with the electrical engineering, electronics engineering and computer engineering discipline. It has its headquarters at New York city.

It is one of the the world’s largest professional technical organization that is dedicated to the advancing technology for the welfare of the society and humanity.

It has various committees and communities. These committees are expert committees and take active participation in conferences, research, authorship, etc.

There are committees such as IEEE Awards Board, IEEE Fellow Committee, IEEE Governance Committee, etc.  

Given a binary search tree containing N integers, create an AVL tree containing the same values. You should not destroy the original BST in the process. What is the worst case time?

Answers

Answer:

answer : 0 (n log n )

Explanation:

Creating an AVL tree containing the same values and containing N integers and without destroying the original BST in the process, the worst case time will be : 0 ( n log n ) and this is because each insertion will take 0 (log n ) time

The worst case time for a binary search algorithm that contain N integers without destroying the original binary search tree (BST) is [tex]0(NlogN)[/tex]

What is a binary search?

Binary search can be defined as an efficient algorithm that is designed and developed for searching an element from a sorted list of data, especially by using the run-time complexity of [tex]0(logN)[/tex].

Note: N is the total number of elements contained in a list.

In this scenario, the worst case time for this binary search algorithm that contain N integers without destroying the original binary search tree (BST) is given by [tex]0(NlogN)[/tex]

Read more on binary search here: https://brainly.com/question/24268720

1. What do you think of the use of Moore’s Law to hypothesize a timeframe for the origin of life?
2. How does Moore’s Law apply to the efficiency of algorithms as we discussed in the last class?
3. Where do you think computers will be in 10 years? 100?

Answers

Answer:

1. I think it was actually a very good idea. As time goes on technology is improved, new laws and theories are proven, scientists are disproven, and efficiency of doing certain tasks evolves. Another reason would be, why not? It does not hurt to make a hypothesis or try a new approach.  

1. We spend countless time exploring and digging only to possible never find what we need to exactly pin the first life forms on Earth and when they lived, why not try a new different angle. So, I think that it was a very clever and interesting to use and Moore's Law to hypothesis the origin of life.  

2. Moore's law applies to the efficiency of algorithms because he came up with a way to hypothesis were in technology we should stand after a certain amount of time and how much improvements should be integrated into our computers.

2. Moore’s Law applies to the efficiency of algorithms because Moore created a exponential equation and graph of a hypothesis proven to help guide engineers on a steady path of improvement should be made to  computer processors and components with in a certain amount of time.

3. In a 10 years I think computers would have only made simply yet very effective and efficient improvements. Like longer battery life, or faster speeds, but virus firewalls and defenders. But when faced with 100 years I think that would have lead to a huge drastic change to what the normal idea of a computer is. It would be so high tech to us but with the world our grandkids are living in it'll be normal to have holographic computers.

3. I think that in 10 years computers would have improved much like they have recently, smaller, more compact, faster, and longer lasting, but within 100 years we would have a another invention entirely. Computers would have changed so much more than we could have every thought.

Explanation: I put a few different answers for each question so you can mix and match and use what's easiest for you but both are correct.

Which Packet Tracer feature do you think will be most helpful for you in learning how to manage a network

Answers

Answer:

Its ability to sniff and analyze packets in a network.

Explanation:

Network administrators require advanced skills and tools to manage a large network, to analyze packets as they are transmitted across the network.

Packet tracer helps to monitor the network connection and packet transfer. It informs the administrator of a dropped connection, slow transmission due to a bottle-neck, and many more packet related issues

Other Questions
PLS HURRY IM BEING TIMED What is the cost Ben drove 230 kilometers in 3 hours, and Pia drove 250 kilometers in 3 hours. Without making any calculations, who drove faster? analyzeA)understandB)examineC)repeat thoughtD)decide Store A sells 3 candy bars for $3.45.Store B charges $5.45 for 5 candy bars.Store C sells 7 candy bars for $7.56.Which store offers the best value? once the perfume molecules reach the other side of room , what do the perfume molecules do Give to reasons why girls are lured into unsafe relationships Which of Animal Farm's themes is illustrated in this excerpt? what do you think a divergent (constructive) boundary is? How do plates interact with each other? Hello! Please help with my English work. Thank you so much! YOU WILL GET BRAINLIEST!!!!!!Read the passage below. Then, write a response answering the following questions: Which type of figurative language is used in this passage? How does this figurative language contribute to the meaning of the passage? How does it clarify your understanding?PassageI'm hoping the budding Michelangelo in my drawing class goes after that scholarship. I know in my gut that he would succeed, and the world needs more artists like him. The only thing holding him back is his own self-doubt. Which of the following is an advantage of using focus group research instead of survey research?You can get information from a medium sized group of people.You can get information from larger numbers of people.You can get more detailed information from vantage of using focus group research Instead of survey research?You can get information from a medium sized group of peopleYou can get information from large numbers of people.You can get more detailed information from individualsYou can get information from a more representative sampleYou can get information from a more representative sample. A 550 kJ of heat quantity needed to increase water temperature from 32C to 80C. Calculate the massof the water when the specific heat capacity of water is 4200 J/kg C. Read the excerpt from Part 1 of The Odyssey by Homer.They fell in, soon enough, with Lotus-Eaters,who showed no will to do us harm, onlyoffering the sweet Lotus to our friendsbut those who ate this honeyed plant, the Lotus,never cared to report, nor to return:they longed to stay forever, browsing onthat native bloom, forgetful of their homeland.I drove them, all three wailing, to the ships,tied them down under their rowing benches,and called the rest: All hands aboard;come, clear the beach and no one tastethe Lotus, or you lose your hope of home.Which line from the excerpt supports the conclusion that Odysseus cares for his men?They fell in, soon enough, with Lotus-Eaters,offering the sweet Lotus to our friendsthey longed to stay forever, browsing onI drove them, all three wailing, to the ships, 2. What helped Scott fit in?The great gatsby Erin is buying a tv with an original price of 650. She receives a 20% discount. How much will Erin pay, before tax, for the TV 10 Lakh More Than 93,23,654 Given: ! || m and p || 9,MAm432.12/119/10P8/75/616/1513/14Note:Figure notdrawn toscale.Given m27 = (x2 10x + 50 and m/13 = (10x 50, what is thevalue of x?0-10O 9.487O 1013.416Previous You make $0.50 for every newspaper you sell during the week. Last week you made $30.50 How many newspapers did you sell. find the slope for (1, -7) (-5, 0) in pycharm, write a program that prompts the user for their name and age. your program should then tell the user the year they were born. here is a sample execution of the program what is your name? Amanda how old are you? 15. This is what I have so far but I can't get pycharm to tell me the year I was born.import datetimename = input("What is your name? ")age = input("How old are you? ")year = datetime.datetime.now().yearprint("Hello ' + name + ' you were born in " (year - age)) The next dividend payment by Dizzle, Inc., will be $2.85 per share. The dividends are anticipated to maintain a growth rate of 5.00 percent, forever. If the stock currently sells for $49.30 per share, what is the required return