answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oduvanchick [21]
2 years ago
4

If-else expression: Operator chaining.

Computers and Technology
1 answer:
blagie [28]2 years ago
8 0

Answer:

user_grade = int(input())

if 9<= user_grade <= 12:

   print("in high school")

Explanation:

*The code is in Python.

Get the input from the user and assign it to the  user_grade

Check the value of the  user_grade using if structure. If it is between 9 and 12 (inclusive), print "in high school" message

You might be interested in
PYTHON PROGRAMMING: At one college, the tuition for a full-time student is $8,000 per semester.
lozanna [386]

Answer:

Try :

Semester_Fee = 8000.0

for x in range(1, 6):

   import decimal

   Semester_Fee = Semester_Fee + Semester_Fee *(3/(100*1.0))

   if x==1:

       print("In",x,"year, the tuition will be" ,'$', Semester_Fee, end='.')

   else:

       print("In",x,"years, the tuition will be" ,'$', Semester_Fee, end='.')

6 0
2 years ago
Which role is delegated to personnel of the IT department and is responsible for maintaining the integrity and security of the d
enyata [817]

Correct question.

Which role is delegated to personnel of the IT department and how is responsible for maintaining the integrity and security of the data?

Answer:

<u>data custodian</u>

<u>Explanation:</u>

Remember, every organization generates data, and large organizations generate even larger data.

Hence, the role of a data custodian in an organization requires He implements measures to protect the organization's data, store and backup the data, as well as granting access to the data to authorized persons when needed.

3 0
2 years ago
Write code that uses the input string stream inss to read input data from string userinput, and updates variables usermonth, use
mr Goodwill [35]

Answer:

It will be a java code.

Explanation:

import java.util.Scanner;

public class StringInputStream {

    public static void main (String [] args) {

        Scanner inSS = null;

        String userInput = "Jan 12 1992";

        inSS = new Scanner(userInput);`

        String userMonth = "";

        int userDate = 0;

        int userYear = 0;

        /* Your solution goes here  */

        System.out.println("Month: " + userMonth);

        System.out.println("Date: " + userDate);

        System.out.println("Year: " + userYear);

        return;

   }

}

3 0
2 years ago
Read 2 more answers
Which code fragment would correctly identify the number of arguments passed via the command line to a Java application, excludin
blondinia [14]

Answer:

The answer is a. int count =args.length

Explanation:

Which code fragment would correctly identify the number of arguments passed via the command line to a Java application, excluding the name of the class that is being invoked?

a. int count = args.length;

b. int count=0; while (!(args[count].equals(""))) count ++;

c. int count = args.length - 1;

d. int count = 0; while (args[count] != null) count ++;

The answer is a. int count =args.length

args is a string array object, which contains set of all arguments. You can find the number of argument by using args.length.

8 0
2 years ago
No Browsing History While using the browser on your tablet, you realize that it is not keeping a history of websites you have vi
My name is Ann [436]

Answer & Explanation:

No Browsing History:

  • Your browser is probably set to incognito mode, change it to general mode.
  • space set on your drive to save the content from your browser might be completely filled, Make sure you have given your browser enough space on your drive to save contents.
  • The number of days to record the history in your browser is set to 0, Check the settings and make sure it is not set to 0.

Phishing Scam

  • Change all the credentials on the site that you have disclosed.
  • Immediately report the mail to an IT department and necessary authorities.
  • Mark the mail as span and block the mail id.

Suspicious File Attachment

  • May be that the suspicious file contains a virus file. Often such viruses are attached to external "Show-case" files so that the victim is not able to identify them. Once the external file is tried to open, the virus slips into the main memory (your RAM) and start executing in the background, creating copies of itself and executing every copy. Soon they start eating up the main memory (The memory that runs all your programs) making your PC slow to respond.

Antivirus Software Outdated

  • Connected to the Internet and update the antivirus.

Laptop's Physical Security

  • Set a password.
  • install a tracking software.
4 0
2 years ago
Other questions:
  • Jim has excellent oral and written communication skills. He enjoys public speaking and wants a job in which he will interact wit
    14·2 answers
  • A windows host sends a tcp segment with source port number 1200 and destination port number 25. the sending host is a(n) _______
    10·1 answer
  • A slide in Blake's presentation contained the following information:
    11·1 answer
  • Modify the TimeSpan class from Chapter 8 to include a compareTo method that compares time spans by their length. A time span tha
    10·1 answer
  • Compare the memory organization schemes of contiguous memory allocation and paging with respect to the following issues: a. Exte
    12·1 answer
  • In cell M2, enter a formula using a nested IF function as follows to determine first if a student has already been elected to of
    12·1 answer
  • Choose the reasons why Windows Server operating systems are a popular choice for a network because they _____. Select all that a
    12·1 answer
  • Find true or false. A hacker is hacking software with access in sensitive information from your computer​
    9·1 answer
  • Animated graphics that are displayed on the screen after a set of time when the computer is unattended.​
    8·1 answer
  • What is the impact of VR on Educational Learning rather than games?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!