Identify and differentiate between the two (2) types of selection structures

Answers

Answer 1

Answer:

there are two types of selection structure which are if end and if else first the differentiation between if and end if else is if you want your program to do something if a condition is true but do nothing if that condition is false then you should use an if end structure whereas if you want your program to do something if a condition is true and do something different if it is false then you should use an if else structure


Related Questions

Which of the following is not a computer application?

a. Internet Explorer

b. Paint

c. Apple OSX

d. Microsoft Word

Answers

Answer:C.apple Osx
Answer C

Apple OSX is not a computer application.

The information regarding the computer application is as follows:

The program of the computer application should give the skills that are required for usage of the application software on the computer.An application like word processing, internet, etc.Also, the computer application includes internet explorer, paint, and Microsoft word.

Therefore we can conclude that Apple OSX is not a computer application.

Learn more about the computer here: brainly.com/question/24504878

you get a call from a customer who says she can't access your site with her username and password. both are case-sensitive and you have verified she is entering what she remembers to be her user and password correctly. what should you do to resolve this problem?

a. have the customer clear her browser history and retry

b. look up her username and password, and inform her of the correct information over the phone

c. have the user reboot her system and attempt to enter her password again

d. reset the password and have her check her email account to verify she has the information

Answers

Answer:

answer would be D. I do customer service and would never give information over the phone always give a solution

In order to resolve this problem correctly, you should: D. reset the password and have her check her email account to verify she has the information.

Cybersecurity can be defined as a group of preventive practice that are adopted for the protection of computers, software applications (programs), servers, networks, and data from unauthorized access, attack, potential theft, or damage, through the use of the following;

Processes.A body of technology.Policies.Network engineers.Frameworks.

For web assistance, the security standard and policy which must be adopted to enhance data integrity, secure (protect) data and mitigate any unauthorized access or usage of a user's sensitive information such as username and password, by a hacker, is to ensure the information is shared discreetly with the user but not over the phone (call).

In this context, the most appropriate thing to do would be resetting the password and have the customer check her email account to verify she has the information.

Read more: https://brainly.com/question/24112967

Secure email technique that provides confidentiality, along with authentication, integrity, and non-repudiation. It uses a centralized trust model where users get a certificate from a trusted CA.

a. True
b. False

Answers

Answer:

a

Explanation:

just put a

The menu bar display information about your connection process, notifies you when you connect to another website, and identifies the percentage information transferred from the Website server to your browser true or false

Answers

Answer:

false

Explanation:

My teacher quized me on this

Which is the most correct option regarding subnet masks?

Answers

Answer:

thanks for your question

The Cartesian product of two lists of numbers A and B is defined to be the set of all points (a,b) where a belongs in A and b belongs in B. It is usually denoted as A x B, and is called the Cartesian product since it originated in Descartes' formulation of analytic geometry.

a. True
b. False

Answers

The properties and origin of the Cartesian product as stated in the paragraph

is true, and the correct option is option;

a. True

The reason why the above option is correct is stated as follows;

In set theory, the Cartesian product of two number sets such as set A and set

B which can be denoted as lists of numbers is represented as A×B and is the

set of all ordered pair or points (a, b), with a being located in A and b located

in the set B, which can be expressed as follows;

[tex]\left[\begin{array}{c}A&x&y\\z\end{array}\right] \left[\begin{array}{ccc}B(1&2&3)\\\mathbf{(x, 1)&\mathbf{(x, 2)}&\mathbf{(x, 3)}\\\mathbf{(y, 1)}&\mathbf{(y, 2)}&\mathbf{(y, 3)}\\\mathbf{(z, 1)}&\mathbf{(z, 2)}&\mathbf{(z, 3)}\end{array}\right]}[/tex]

The name Cartesian product is derived from the name of the philosopher,

scientist and mathematician Rene Descartes due to the concept being

originated from his analytical geometry formulations

Therefore, the statement is true

Learn more about cartesian product here:

https://brainly.com/question/13266753

Which of the following BEST describes an inside attacker?
An agent who uses their technical knowledge to bypass security.
An attacker with lots of resources and money at their disposal.
A good guy who tries to help a company see their vulnerabilities.
An unintentional threat actor. This is the most common threat.​

Answers

The inside attacker should be a non-intentional threat actor that represents the most common threat.

The following information related to the inside attacker is:

It is introduced by the internal user that have authorization for using the system i.e. attacked.It could be intentional or an accidental.So it can be non-intentional threat.

Therefore we can conclude that The inside attacker should be a non-intentional threat actor that represents the most common threat.

Learn more about the threat here: brainly.com/question/3275422

Identify the class of the address, the number of octets in the network part of the address, the number of octets in the host part of the address, the network number, and the network broadcast address g

Answers

Answer:

1.

190.190.190.190

Class B

Number of octets in the network part of the address: 2

Number of octets in the host part of the address: 2

Network number: 190.190.0.0/16

Network broadcast address: 190.190.255.255

2.

200.1.1.1

Class C

Number of octets in the network part of the address: 3

Number of octets in the host part of the address: 1

Network number: 200.1.1.0/24

Network broadcast address: 200.1.1.255

Explanation:

A test for logical access at an organization being audited would include: Group of answer choices Checking that the company has a UPS and a generator to protect against power outages Making sure there are no unmanaged third-party service level agreements Performing a walkthrough of the disaster recovery plan Testing that super user (SYSADMIN) access is limited to only appropriate personnel

Answers

Answer:

Testing that super user (SYSADMIN) access is limited to only appropriate personnel.

Explanation:

A test for logical access at an organization being audited would include testing that super user (SYSADMIN) access is limited to only appropriate personnel.

What will be the pseudo code for this

Answers

Answer:

Now, it has been a while since I have written any sort of pseudocode. So please take this answer with a grain of salt. Essentially pseudocode is a methodology used by programmers to represent the implementation of an algorithm.

create a variable(userInput) that stores the input value.

create a variable(celsius) that takes userInput and applies the Fahrenheit to Celsius formula to it

Fahrenheit to Celsius algorithm is (userInput - 32) * (5/9)

Actual python code:

def main():

   userInput = int(input("Fahrenheit to Celsius: "))

   celsius = (userInput - 32) * (5/9)

   print(str(celsius))

main()

Explanation:

I hope this helped :) If it didn't tell me what went wrong so I can make sure not to make that mistake again on any question.    

What are the benefits of using LinkedIn Sales Navigator?

Answers

Answer:

Well, there are a number of advantages that come with this advanced LinkedIn automation tool. Here are some of the top benefits of a Sales Navigator:

1. Can find and export up to 5000 prospects at a time.

2. Enables you to send 30 InMails per month

3. Easy access Teamlink -enabling you to expand your network by pooling connections

4. Integrate with existing systems

We canconnect  two or more computer together using cables true or false​

Answers

This is true for most modern computers

a. Download the attached �Greetings.java� file.
b. Implement the �getGreetings� method, so that the code prompts the user to enter the first name, the last name, and year of birth, then it returns a greetings message in proper format (see the example below). The �main� method will then print it out. Here is an example dialogue with the user:
Please enter your first name: tom
Please enter your last name: cruise
Please enter your year of birth: 1962
Greetings, T. Cruise! You are about 50 years old.
Note that the greetings message need to be in the exact format as shown above (for example, use the initial of the first name and the first letter of the last name with capitalization).
c. Submit the final �Greetings.java� file (DO NOT change the file name) online.

Answers

Answer:

Code:

import java.util.*;  

public class Greetings  

{  

   public static void main(String[] args)  

   {        

       Scanner s = new Scanner(System.in);  

       System.out.println(getGreetings(s));  

   }  

   private static String getGreetings(Scanner console)  

   {          

   System.out.print("Please enter your first name: ");  

   String firstName=console.next();    

   char firstChar=firstName.toUpperCase().charAt(0);  

   System.out.print("Please enter your last name: ");  

   String lastName=console.next();    

   lastName=lastName.toUpperCase().charAt(0)+lastName.substring(1, lastName.length());  

   System.out.print("Please enter your year of birth: ");  

   int year=console.nextInt();  

   int age=getCurrentYear()-year;  

   return "Greetings, "+firstChar+". "+lastName+"! You are about "+age+" years old.";  

   }  

   private static int getCurrentYear()  

   {  

       return Calendar.getInstance().get(Calendar.YEAR);  

   }  

}

Output:-

Write a program that takes a date as input and outputs the date's season. The input is an integer to represent the month and an integer to represent the day. Ex: If the input is: 4 11 the output is: spring In addition, check if both integers are valid (an actual month and day). Ex: If the input is: 14 65 the output is: invalid The dates for each season are: spring: March 20 - June 20 summer: June 21 - September 21 autumn: September 22 - December 20 winter: December 21 - March 19

Answers

Answer:

Explanation:

The following program is written in Java. It is a function that takes in the two parameters, combines them as a String, turns the combined String back into an integer, and uses a series of IF statements to check the parameters and determine which season it belongs to. Then it prints the season to the screen. The code has been tested with the example provided in the question and the output can be seen in the attached image below.

class Brainly {

   public static void main(String[] args) {

       getSeason(4, 65);

       getSeason(4, 11);

   }

   public static void getSeason(int month, int day) {

       String combined = String.valueOf(month) + String.valueOf(day);

       int combinedInt = Integer.parseInt(combined);

       if ((month > 0 && month < 12) && (day > 0 && day < 31)) {

           if ((combinedInt >= 320) && (combinedInt <= 620)) {

               System.out.println("The Season is Spring");

           } else if ((combinedInt >= 621) && (combinedInt <= 921)) {

               System.out.println("The Season is Summer");

           } else if ((combinedInt >= 922) && (combinedInt <= 1220)) {

               System.out.println("The season is Autumn");

           } else {

               System.out.println("The Season is Winter");

           }

       } else {

           System.out.println("Invalid date");

       }

   }

}

g A catch block that expects an integer argument will catch Group of answer choices all exceptions all integer exceptions any exception value that can be coerced into an integer C

Answers

Answer:

Hence the correct option is 2nd option. all integer exceptions.

Explanation:

A catch block that expects an integer argument will catch all integer exceptions.

The tax calculator program of the case study outputs a floating-point number that might show more than two digits of precision. Use the round function to modify the program to display at most two digits of precision in the output number.

Answers

Answer:

Explanation:

The following code is written in Python. The tax calculator program was not provided, therefore I created a tax calculator that takes in the total price as an input and adds a 7% tax to it. Then it uses the round() function to make sure that the total is outputted as a decimal with two decimal digits at most.

def taxCalculator(price):

   total = price * 1.07

   formattedTotal = round(total, 2)

   return formattedTotal

Create a multimedia project that contains the text element and all the contents that you have studied about that element

Answers

Answer:

no sé jejejejeje

lslsl

lonsinet

ko

Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (current_price * 0.051) / 12. Output each floating-point value with two digits after the decimal point, which can be achieved as follows: print('{:.2f}'.format(your_value))

Answers

Answer:

The program in Python is as follows:

current_price = int(input("Current Price: "))

last_price = int(input("Last Month Price: "))

change = current_price - last_price

mortgage = (current_price * 0.051) / 12

print('Change: {:.2f} '.format(change))

print('Mortgage: {:.2f}'.format(mortgage))

Explanation:

This gets input for current price

current_price = int(input("Current Price: "))

This gets input for last month price

last_price = int(input("Last Month Price: "))

This calculates the price change

change = current_price - last_price

This calculates the mortgage

mortgage = (current_price * 0.051) / 12

This prints the calculated change

print('Change: {:.2f} '.format(change))

This prints the calculated monthly mortgage

print('Mortgage: {:.2f}'.format(mortgage))

Answer:

current_price = int(input())

last_months_price = int(input())

change = current_price - last_months_price

mortgage = current_price * 0.051 / 12

print('This house is $', end= '')

print(current_price, end= '. ')

print('The change is $', end= '')

print(change, end= ' ')

print('since last month.')

print('The estimated monthly mortgage is $', end= '')

print(mortgage, end='0.\n')

a computer works on input processing output device
true
false​

Answers

a computer works on input processing output device true

Answer:

a computer works on input processing output device. True

Explanation:

God bless you.

Consider a network that is a rooted tree, with the root as its source, the leaves as its sinks, and all the edges directed along the paths from the root to the leaves. Design an efficient algorithm for finding a maximum flow in such a network. What is the time efficiency of your algorithm

Answers

Answer:

please mark me brainlist

Explanation:

Create a python program that display this
Factorial Calculator
Enter a positive integer: 5
5! = 1 x 2 x 3 x 4 x 5
The factorial of 5 is: 120
Enter a positive integer: 4
4! = 1 x 2 x 5 x 4
.
The factorial of 4 is: 24
Enter a positive integer: -5
Invalid input! Program stopped!​

Answers

Answer:

vxxgxfufjdfhgffghgfghgffh


Calculator is an example of
computer
A. analogue
B. hybrid
C. manual
D. digital
E. public​

Answers

D. digital

Explanation:

I hope it helps you

As the first step, load the dataset from airline-safety.csv by defining the load_data function below. Have this function return the following (in order):
1. The entire data frame
2. Total number of rows
3. Total number of columns
def load_data():
# YOUR CODE HERE
df, num_rows, num_cols

Answers

Answer:

import pandas as pd

def load_data():

df = pd.read_csv("airline-safety.csv')

num_rows = df.shape[0]

num_cols = df.shape[1]

return df, num_rows, num_cols

Explanation:

Using the pandas python package.

We import the package using the import keyword as pd and we call the pandas methods using the dot(.) notation

pd.read_csv reads the csv data into df variable.

To access the shape of the data which is returned as an array in the format[number of rows, number of columns]

That is ; a data frame with a shape value of [10, 10] has 10 rows and 10 columns.

To access the value of arrays we use square brackets. With values starting with an index of 0 and so on.

The row value is assigned to the variable num_rows and column value assigned to num_cols

Write a Racket two-way selection structure that will produce a list '(1 2 3) when the first element of a list named a_lst is identical to the atom 'a and an empty list otherwise. Note that you are NOT required to write a function definition!

Answers

Answer:

A

Explanation:

_________ are standard devices, such as switches and routers, that have small onboard computers to monitor traffic flows through the device as well as the status of the device and other devices connected to it

Answers

Answer:

Managed devices

Explanation:

hope it helps u

Instructions
Create a multimedia project that contains the text element and all the contents that you have studied about that element

Answers

Answer:

iiiio888887776558777u765

the base on which the number n=(34)? is written if it has a value of n= (22)10​

Answers

If I'm understanding the question correctly, you are looking for an integer b (b ≠ 0, b ≠ 1) such that

[tex]34_b = 22_{10}[/tex]

In other words, you're solving for b such that

b ¹ + 4×b ⁰ = 22

or

3b + 4 = 22

Solving this is trivial:

3b + 4 = 22

3b = 18

b = 6

So we have

34₆ = 22₁₀

A computer has many resources. A resource can be memory, disk drive, network bandwidth, battery power, or a monitor. It can also be system objects such as shared memory or a linked list data structure. This principle is based in object-oriented programming (OOP). In OOP, a class definition encapsulates all data and functions to operate on the data. The only way to access a resource is through the provided interface. Which security principle are we referring to

Answers

Answer:

The security principle being referred to here is:

Resource Encapsulation.

Explanation:

Resource Encapsulation is one of the cybersecurity first principles.  It allows access or manipulation of the class data as intended by the designer. The cybersecurity first principles are the basic or foundational propositions that define the qualities of a system that can contribute to cybersecurity.  Other cybersecurity first principles, which are applied during system design, include domain separation, process isolation, modularization, abstraction, least principle, layering, data hiding, simplicity, and minimization.

5 Major of computer application

Answers

Im assuming you means applications as in Apps.

Microsoft windows
Microsoft internet Explorer
Microsoft office or outlook
Mcafee antivirus
Adobe pdf

Answer:

Basic Applications of Computer

1 ) Home. Computers are used at homes for several purposes like online bill payment, watching movies or shows at home, home tutoring, social media access, playing games, internet access, etc.

2 ) Medical Field.

3 ) Entertainment.

4 ) Industry.

5 ) Education.

Explanation:

Hope it helps you

Mark my answer as brainlist

have a good day

what is computer with figure​

Answers

Answer:

A computer is an electronic device that accept raw data and instructions and process it to give meaningful results.

Other Questions
plz help me find the answers Using the GLOBE study results and other supporting data, determine what Japanese managers believe about their subordinates. How are these beliefs similar to those of U.S. and European managers? How are these beliefs different? A balloon is going vertically upwards at a speed of 10 ms-1 . When it was 30 m above the ground, an object is dropped from it. How long does the object take to reach the ground? (g = 10 ms-1 ) why did the british troops make an immediate move to prevent the followers of al-mahdi? Select the vocabulary term that best relates to the text.Daniela, primero, baa al perro, segundo, juega con el gato, y tercero, limpia el agua del pez.Based on the text, what would be the best place for Daniela to volunteer at. El comedor de beneficencia El hogar de ancianos El proyecto de accin social El refugio de animales The final lines of the folktale state: And that is why there are two things you can always count on running into in this world: Misery and Death: La miseria y la muerte. Write one to three sentences explaining the lesson of the folktale. Which of these is an example of a literal equation?A. 4x + 7 = 22B. 5+ 20 = 52C. ax - by = kD. 2x + 7y SOMEONE PLS HELP ME I WILL MAKE U BRAINLIST ! In a survey sample of 83 respondents, about 30.1 percent of the samplework less than 40 hours per week. What is the estimated standard error for the group of respondents who work 40 hours or more per week?(*round to two decimal places) Solve for F (15 Points) Proximity, __________, and common fate have to do with the way we tend to see things as being related to each other.The part of the inner ear thats responsible for transmitting auditory signals to the brain is the __________.The unit of measurement used for sound is the __________.According to __________ theory, pain impulses from a stubbed toe might be partly blocked by the sensory impulses generated by rubbing the foot.The faintest sound you can hear is called your __________ threshold.According to the __________ principle of perceptual organization, we tend to connect separated but adjacent stimuli as flowing smoothly together.We find three different kinds of neurons in the skin. They register temperature, __________, and pain.Our eyes gather light information, but our __________ actually does the seeing.For the sense of hearing, pitch is related to frequency and amplitude is related to __________.The amount of light entering the eye is regulated by the widening and contraction of the __________. A chemist measures the energy change H during the following reaction:2NH3(g)N2(g)+3H2(g)H=160kJUse the information to answer the following questions.This reaction is:__________.a. endothermicb. exothermicSuppose 70.9 g of NH3 react. Will any heat be released or absorbed?a. Yes, absorbedb. Yes, releasedc. No.If you said heat will be released or absorbed in the second part of this question, calculate how much heat will be released or absorbed. Round your answer to 3 significant digits. Suppose a friend is trying to claim that it is summer when Earth is closest to the Sun and winter when Earth is farthest away. Refute this claim in at least two different ways: (1) with an argument that invokes seasonal differences between the Northern and Southern Hemispheres and (2) with an argument based on the times of year at which Earth actually is closest to and farthest from the Sun. Write out your arguments clearly Building self-esteem means thinking positively about yourself Mackenzie earns 4% commission as a salesperson. She sold a digital camera that cost $767. How much commission did Mackenzie earn? which ordered pairs are in the solution set of the system of linear inequalities? y > -1/3x+2 -y What is the inverse of the function f(x) = 1/9x + 2 1+1+1+222222?pls help have points Mary is 3 years older than Sarah. Winifred is twice as old as Mary. Altogether their ages total 89. How old is Sarah? 24 years old 22 years old 18 years old None of these choices are correct. Question 520 ptsIf enzymes could not be used during a reaction, which of thefollowing could be added to a system to make the reaction occur?O energy (possibly heat)water0 productO substrate How do the stage directions in brackets affect the meaning of the text? They tell the reader that Torvald opens his door only when he realizes that Nora has spent money. They tell the reader that Torvald uses pet names for Nora and treats her like a child. They show the reader that Torvald thinks that Nora bought too much.