A car dealership only sells cars that have fewer than 10 000 miles and are 5 years old or less. (i) Write an algorithm that will: • ask the user to enter the number of miles and the age of a car • validate the input to check that only sensible values that are in the given range are entered • output True if valid data has been entered or False if invalid data has been entered.

Answers

Answer 1

Answer:

Algorithm:

ValidateCarData (milesDrives, age)

Start

Prompt the user to enter the number of miles and the age of a car.Get the input from the user.Store the number of drives in the variable named milesDrives and the age of the car in the variable named age.if ( milesDrives < 10000 and age <= 5)

               Display true.

else

              Display false.

Stop

Explanation:

Algorithm: An algorithm is a step-by-step solution to a problem in a finite number of steps.

A car dealer sells only the car that

drives less than 10000 milesand the age of the car is equal to or less than 5 years.

Prompt the user to enter the number of miles and the age of a car.

Validate the user-entered data.

when the user-entered data is valid (car drive fewer than 10000 miles and 5 years or less old)

Display true (user enters the valid data).

else (car drives more than 10000 miles or more than 5 years old)

Display false (user enters the invalid data).


Related Questions

Alt +f4 is a short cut of close a document in MS word /ture /false​

Answers

Answer:

True.

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.

In Computer science, there are specific key combinations (short cut) that avail end users the opportunity to perform specific functions without having to go through a series of step.

For example, when you press the Alt button and function key 4 (F4) at the same time, it would close the current open window.

Hence, Alt + F4 is a short cut key that can be used to close a document in MS word.

In saving a Visual Basic project properly , which of the following: two components part are involved ?

A) Folder and Form
B) Form and File
C) Project and Form
D) Project and Data

Answers

Answer:

C) Project and Form

Explanation:

In saving a Visual Basic project properly, the following: two components part that is involved are:

1. Project - this is the project file that will be saved in the computer's memory. On the toolbar of a Visual Basic Editor, there is a "Save Project File" icon, which will be clicked to save a Project file.

2. File - the is the Visual Basic Editor's user interface. Just like "window" in Microsoft Office, it is the space used in writing or building the project file.

What came first, the internet or WIFI?

Answers

Answer: wifi

Explanation:

because you can't have the internet if you don't have wifi to power it up

A news company is planning to use a Hardware Security Module (CloudHSM) in AWS for secure key storage of their web applications. You have launched the CloudHSM cluster but after just a few hours, a support staff mistakenly attempted to log in as the administrator three times using an invalid password in the Hardware Security Module. This has caused the HSM to be zeroized, which means that the encryption keys on it have been wiped. Unfortunately, you did not have a copy of the keys stored anywhere else.

How can you obtain a new copy of the keys that you have stored on Hardware Security Module?

Answers

Answer:

you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

Explanation:

Hardware Security Module (CloudHSM) is a cloud-based hardware security module (HSM) that provides the user the opportunity to create and utilize your own encryption keys on the AWS Cloud. It is a fully managed service that takes care of time-consuming administrative activities such as software patching, backups, hardware provisioning, and high-availability for the user.

One of the key elements of the Hardware Security Module (CloudHSM) is that a copy of the keys stored must be kept somewhere because if keys are lost, they are lost forever and a new copy cannot be obtained if a copy is not kept.

Therefore, you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

Your computer system is a participant in an asymmetric cryptography system. You've created a message to send to another user. Before transmission, you hash the message and encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user. In this example, which protection does the hashing activity provide

Answers

Answer: Integrity

Explanation:

Based on the information given, it should be noted that the protection that the hashing activity provides is integrity. In cryptography, hashing is used in the verification of integrity.

To determine integrity, comparison can be made between data and a hash value. When data is hashed at a particular time, the hash value is protected. Then, to ensure integrity, the data can then be hashed again after which it'll be compared to the protected value.

If the amount of food or resources available increases, the carrying capacity for an animal:

Answers

Answer: increases

Explanation:

The carrying capacity of an environment simply refers to the maximum population size of the species which the environment can sustain with the available resources such as food and water.

When the amount of food or resources available increases, then the carrying capacity for an animal: will increase as well. Assuming there's a reduction in resources, then there'll be reduction in carrying capacity.

Which phrases suggest that Bob is a web administrator?
Bob logs in to his computer. He checks his email. He then researches online for a system upgrade of a new machine. He fills his timesheet at
his organization detailing the tasks completed during the week. Later in the day, Bob creates a weekly backup from a remote web server.

Answers

"creates a weekly backup from a remote web server"

This implies that he is the owner of the server since, one, he backs it up every week, and two, he has access to create a backup.

To indent an entire paragraph or list you should:

A. Use the paragraph spacing icon
B. Use the select icon
C. Use the tab key on your keyboard
D. Use the decrease indent icon

Answers

Answer:

C. Use the tab key on the keyboard

(a easier and fastest way to add a indent in the paragraph)

Adrcle has a diameter of 4 inches. Which statement about the area and circumference of the circle is true?
A comparison of the area and circumference of the circle is not possible because there is not enough information
to find both
The numerical values of the circumference and area are equal
The numerical value of the circumference is greater than the numeste value of the area
The numerical value of the circumference is less than the numerical value of the area

Answers

Answer:

The numerical values of the circumference and area are equal

Explanation:

Area of a circle = πr²

Circumference of a circle = 2πr

Radius, r = diameter/2

= 4 inches/2

= 2 inches

r = 2 inches

π = 3.14

Area of a circle = πr²

= 3.14 * 2²

= 3.14 * 4

= 12.56 inches ²

Circumference of a circle = 2πr

= 2 * 3.14 * 2 inches

= 12.56 inches

Area of a circle = 12.56 square inches

Circumference of a circle = 12.56 inches

The numerical values of the circumference and area are equal

______ language is written using 0's and 1's​

Answers

Answer:

Binary language is written using 0's and 1's.

Explanation:

That language of 1's and 0's is called binary. Computers speak in binary because of how they are built.

That language of 1's and 0's is called binary. Computers speak in binary because of how they are built.

Define computer with its prossing meaning​

Answers

Answer:

The computer is a device that accepts information (in the form of digitalized data) and manipulates it for some result based on a program, software, or sequence of instructions on how the data is to be processed. Today's computers have both kinds of programming.

Explanation:

did you mean-Define computer with its processing meaning. °•°

Computer is a device that takes input, processes it and gives us output.

Your computer monitor’s power switch is in the ‘ON’ position; however, the display is blank. Which of the following is NOT a likely cause of the problem? *
1 point
the interface cable may be loose
the network adapter is malfunctioning
monitor may be in sleep/hibernate mode
the monitor controls are improperly adjusted

Answers

Answer : Monitor may be in sleep/hibernate mode.

In an online shopping application, the primary case type PurchaseOrder has two child case types: Payment and Packaging. In processing PurchaseOrder case PO-11, Payment case Pay-37 and Packaging case Pac-56 are created. Which statement about the processing of PO-11, Pay-37, and Pac-56 is correct?
A. PO-11 has to be resolved before either Pay-37 and Pac-56 is resolved.
B. Pac-56 has to be resolved before Pay-37 is resolved.
C. Both Pay-37 and Pac-56 have to be resolved before PO-11 can be resolved.
D. PO-11 can be resolved when either Pay-37 or Pac-56 is resolved.

Answers

Answer:

The answer is "Option C".

Explanation:

The principal instance type PurchaseOrder has two types of instance children in an online purchasing application: Pay and Packing. Pay case Pay-37 and packing instance Pac-56 are designed to Sales Orders case PO-11 execution. All statements regarding PO-11, Pay-37, and Pac-56 should be settled before PO-11 may be addressed. Both Pay-37 and Pac-56.

1) A.B+B.C.A.D+A.D
2) A.D+B.C+A.C.B.C.D
3)B.C+A.C.B+A.D​

Answers

Explanation:

Draw AE⊥BC

In △AEB and △AEC, we have

     AB=AC

     AE=AE                     [common]

and,  ∠b=∠c       [because AB=AC]

∴  △AEB≅△AEC

⇒ BE=CE

Since △AED and △ABE are right-angled triangles at E.

Therefore,

     AD2=AE2+DE2 and AB2=AE2+BE2

⇒ AB2−AD2=BE2−DE2

⇒ AB2−AD2=(BE+DE)(BE−DE)

⇒ AB2−AD2=(CE+DE)(BE−DE)    [∵BE=CE]

⇒ AB2−AD2=CD.BD

   AB2−AD2=BD.CD      

A _____ movement tries to improve a part of society, usually through legal methods.

Answers

Answer:

Revisionary

Explanation:

The cafeteria is dark except for one light in the kitchen. The cafeteria manager is in there, counting lunch money. She says that there were some strangers in the school today and they ate lunch in the cafeteria.

Answers

Answer:

Explan

wha??! do u meana

Role of memory in a computer system

Answers

Answer/Explanation:

The role of memory in a computer system is to remember the date you have searched on it or websites you've visited or photos you've taken. This is called the memory drive. Memory drives are very important imagine spending your whole life on this video game and you finally finished your game! Well without the memory drive you'd have to start that game all over again.

Because of the memory drive we can save our data in our devices. Memory drive is used in every device that we use in modern day. Memory drives are important for computers to work properly. Did you know the reason we have fans or holes in the bottom of our computer is to cool the drives down in our computer?

It's because they get overheated cause they work on your computer constantly. Computers are very complex and high tech so it helps to make things into small drives. Memory is important for the survival of tech, computers. We use memory every day in different ways wether its our computers or our devices or our heads.

~ LadyBrain

Check out this app! It's millions of students helping each other get through their schoolwork. https://brainly.app.link/qpzV02MawO ​

Answers

Answer:

Tamam hocam o zaman....

A
is an list of steps to complete a task. *

Answers

Explanation:

hope it helps

pls mark me brainliest thanks

Summary of how I could use my Video Skills outside of school

Answers

Answer:

u can take videos of your journey

- enjoy the moment (like using videos in snap)

- you can record ur life

hope this helps

Answer:

you could make some videos for money

Explanation:

Which of the following type of software would be the MOST appropriate for showing information in tables and reports

Answers

Answer:  B) Database Software

Explanation:

Desktop Publishing software and Multimedia software is not used for storing data, so it can't be that. Spreadsheet software stores data in cells, while Database software stores data in tables.

____coping skills are instinctive.
A. All
B. No
C. Some

Answers

Answer:

Some of them

explanation:

The output for the following code will be: Pasta (1 mark)
My FavFood=Pasta
print (My FavFood)

Answers

Answer:

The output is "Pasta"

Explanation:

Given

The attached code segment

Required

The output

The first line of the program implies that:

MyFavFood="Pasta"

This means that, the value of the variable MyFavFood is string "Pasta"

Next,

print (MyFavFood)

This prints the value of the variable MyFavFood which is "Pasta"

Hence, the output is "Pasta"

Which of the following would not be stored in a cell ?

A. Formula
B. Text
C. Number
D. Chart​

Answers

Answer:

D

Explanation:

Because you can put formulas, text and numbers into a salad, but you can not put a chart interrupt because it won't fit in a cell.

((GUITAR))
What is the letter name for the note shown above?

D
E
F
G

Answers

It is Letter G
Explanation: Took Guitar classes as a kid and memorized the letters.

PLEASE HELP ILL MARK BRAINLIEST!!!
From which two international agreements do most nations derive their intellectual property laws?

Digital Millennium Copyright Act (DMCA)
Berne Convention
Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act (PROTECT IP or PIPA)
World Intellectual Property Organization (WIPO) Copyright Treaty
Stop Online Piracy Act (SOPA)

Answers

Answer:

I. Berne Convention.

II. World Intellectual Property Organization (WIPO) Copyright Treaty.

Explanation:

An intellectual property can be defined as an intangible and innovative creation of the mind that solely depends on human intellect.

Simply stated, an intellectual property is an intangible creation of the human mind, ideas, thoughts or intelligence. They include intellectual and artistic creations such as name, symbol, literary work, songs, graphic design, computer codes, inventions, etc.

An intellectual property (IP) law can be defined as a legal framework and regulations that governs and protects an individual's or organization's intangible and innovative creation of the mind from unauthorized use by a third party. Thus, it is a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

The two international agreements from which most nations derive their intellectual property laws are the Berne Convention and World Intellectual Property Organization (WIPO) Copyright Treaty.

The Berne Convention is an international agreement governing copyright for the protection and equal treatment of literary and artistic works. It was signed into law on the 9th of September, 1886 in Berne, Switzerland and was adopted by eight (8) countries.

The World Intellectual Property Organization (WIPO) Copyright Treaty is an international agreement under the Berne Convention and it governs the protection of literary and artistic works, as well as the rights of authors. It was signed into law on the 20th of December, 1996.

Answer:

Berne Convention

World Intellectual Property Organization (WIPO) Copyright Treaty

Explanation:

I got it right on the Edmentum test.

PLEASE HELP!!! ILL MARK BRAINLIEST!!
Match each form of IPR to the protection it affords.

patent
trademark
copyright

protects the specific expression of a creation
protects signs, symbols, names, or short phrases
that reveal the origin of a product or service
protects the idea underlying a creation

Answers

Answer:

1. Copyright.

2. Trademark.

3. Patent.

Explanation:

A patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

An intellectual property can be defined as an intangible and innovative creation of the mind that solely depends on human intellect.

Simply stated, an intellectual property is an intangible creation of the human mind, ideas, thoughts or intelligence. They include intellectual and artistic creations such as name, symbol, literary work, songs, graphic design, computer codes, inventions, etc.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of the following;

1. Copyright: protects the specific expression of a creation.

2. Trademark: protects signs, symbols, names, or short phrases that reveal the origin of a product or service.

3. Patent: protects the idea underlying a creation.

Directions. Read and analyze the sentences below. There are words or phrases to be corrected. Rewrite it on the blank accrording to what you have learned in the lesson.

Answers

Full question attached

Answer and Explanation:

1. There’s need to ask for help and advice from people who have the

knowledge and skills in making a simple electrical gadget.

2. Adapter is used to plug appliances that are far from the main power source.

3. Do not touch the metal pipes while you are doing electrical repairs.

4. Shut off the power at the main switch or circuit breaker and unplug the equipment when working on electricity.

5. Pliers are tools used to grip, pull or cut electric wires.

From the above, we have corrected some of the errors that could be made in everyday home appliances or home electricity. In number 4, it is also worthy of note that shutting off power at the main switch will only require emergency situations otherwise we need only shut off the one for the problem circuit and leave the rest.

What is the name of database of viruses that an antivirus software scan for?

Answers

Answer:

Anti virus scanner. i hope :)

Explanation:

Andy needs to rank the pages of his website according to importance. What tag will he use on the site map?
Andy will use the ____
tag to rank the pages of his website.

Answers

Answer:

tag. Title tags are used to set up those clickable headlines that you see in the SERP: ...

Meta description tag. ...

Heading (H1-H6) tags. ...

Image alt text. ...

Schema markup. ...

HTML5 semantic tags. ...

Meta robots tag. ...

Canonical tag.

Answer: the priority tag

Explanation:

edmentum

Other Questions
Directions. Read and analyze the sentences below. There are words or phrases to be corrected. Rewrite it on the blank accrording to what you have learned in the lesson. Why are some individuals diagnosed with depression and not bipolar disorder? A bill was introduced into Congress last year suggesting changes to the income tax code. Congress now passed this new tax reform act in the last session and over the next few years the new laws will begin to impact the nation. This is an example of what type of policy Answer correctly please !!!! Will mark Brianliest !!!!!!!!!!!!!! A bookshelf holds 5 sports magazines and 5 architecture magazines.When 3 magazines are taken from the shelf at random, without replacement, what is the probability that all 3 are architecture magazines?3/251/1251/121/8 let f(x)=x-1 and g(x)=x^2+1 f(g)=___ Although it is not a term Excel uses, how do most people think of Excel? During Meiosis, an important event occurs where the chromosomes that you inherited from your mom exchange pieces with the chromosomes you inherited from your dad. This process is called: a. Genetic Exchange b. Recombination c. Synapsis d. Crossing Over A student wanted to determine the evaporation rates of three liquids. She placed 50 mL of eachliquid outside for an hour on the same day and then measured how much liquid evaporated. Whichwould improve the validity of this investigation?A. Put all three liquids outside at the same timeB. Have 2 students work Ctogether on the investigationChange the time for Liquid 3 to 7:008:00 PMhe amount of liquids used An object accelerating at 16 m/s/s doubles its mass and triples its net force acting on it. What will the new acceleration be? (Just number no units) Cmo se dice "It's no big deal" en espaol?A. Pedir perdn.B. No poder ver a alguien ni en pintura.C. No es para tanto. D. Partirle el corazn a alguien. One fish is 4 feet below sea level. Another fish is 3 feet below sea level. Write each position as an integer. Which integer is great? How does Denel set it's price keenan got 13/25 for his mathematics test write down two equivalent fractions for this mark SN1 reactions usually proceed with ________. A) equal amounts of inversion and retention at the center undergoing substitution B) slightly more inversion than retention at the center undergoing substitution C) slightly more retention then inversion at the center undergoing substitution D) complete inversion at the center undergoing substitution E) complete retention at the center undergoing substitution complete retention at the center undergoing substitution slightly more retention then inversion at the center undergoing substitution complete inversion at the center undergoing substitution equal amounts of inversion and retention at the center undergoing substitution slightly more inversion than retention at the center undergoing substitution 6x-27=-3xsolve for x:D Express the given set in roster form. 20 points! Which phrase best completes the table?MonopolyBenefits- has lower production costs?Drawbacks- allows for little competition between businesses May lead to price fixing A. Promotes innovation and entrepreneurshipB. Is less likely to be regulated by the governmentC. Has more money for research and developmentD. Makes a greater variety of products available to consumers Marriott has branded its entire family of accommodations based on different value propositions, supported by clearly delineated pricing strategies. Its offerings include Ritz-Carlton and JW Marriott for the most discriminating patron, Marriott and Renaissance at the next level of full service, and an array of differentially positioned brands such Courtyard and Residence Inn. This is an example where ________ can occur at a level much broader in scope than individual products. What is the length of the radius, r?