If a schema is not given, you may assume a table structure that makes sense in the context of the question. (using sql queries)
Find all Employee records containing the word "Joe", regardless of whether it was stored as JOE, Joe, or joe.

Answers

Answer 1

Answer:

The correct query is;

select * from EMPLOYEE where Employee_Name = 'JOE' or Employee_Name = 'Joe' or Employee_Name = 'joe';

where EMPLOYEE refer to the table name and type attribute name is Employee_Name

Explanation:

Here, the first thing we will do is to assume the name of the table.

Let’s assume the table name is EMPLOYEE, where the column i.e attribute from which we will be extracting our information is Employee_Name

The correct query to get the piece of information we are looking for will be;

select * from EMPLOYEE where Employee_Name = 'JOE' or Employee_Name = 'Joe' or Employee_Name = 'joe';


Related Questions

On the Excel Ribbon, click the Data tab in the Sort & Filter Group, and then click the Sort button to conduct a _____ sort. a. table range b. pivot table c. auto sum d. multiple column

Answers

Answer:

a. Table range

Explanation:

Excel is used for maintaining the data of the company. It contains various formulas, features like pivot table, macros, sort & filter group so the firm could able to present its data in an effective and efficient way

Here the sort button is used to ascending or descending the table based on the name, values, etc

So in the given situation, the first option is correct

Answer:

Datasheet, aecending, home

Explanation:

Define a function readList with one parameter, the (string) name of a file to be read from. The file consists of integers, one per line. The function should return a list of the integers in the file.

Answers

Answer:

Here is the Python function readList:

def readList(filename):  #function definition of readList that takes a filename as a parameter and returns a list of integers in the file

   list = []  # declares an empty list

   with open(filename, 'r') as infile:  # opens the file in read mode by an object infile

       lines = infile.readlines()  # returns a list with each line in file as a list item

       for line in lines:   #loops through the list of each line

           i = line[:-1]  # removes new line break which is the last character of the list of line

           list.append(i)  # add each list item i.e. integers in the list

       return list  #returns the list of integers

#in order to check the working of the above function use the following function call and print statement to print the result on output screen

print(readList("file.txt")) #calls readList function by passing a file name to it

Explanation:

The program is well explained in the comments mentioned with each line of the code.

The program declares an empty list.

Then it opens the input file in read mode using the object infile.

Next it uses readLines method which returns a list with each line of the file as a list item.

Next the for loop iterates through each item of the file which is basically integer one per line

It adds each item of list i.e. each integers in a line to a list using append() method.

Then the function returns the list which is the list of integers in the file.

The program along with it output is attached. The file "file.txt" contains integers 1 to 8 one per line.

An employer plans to pay bonus to each of his employees. Those earning Rs. 2000 or above are to be paid 10 percent of their salary and those earning less than 2000 are to be paid Rs. 200. The input record contains employee number, name and salary of an employee. The output should be employee name and their bonus. Write pseudo code algorithm to process the requirement.

Answers

Answer:

vfg

Explanation:

Write a CREATE VIEW statement that defines a view named InvoiceBasic that returns three columns: VendorName, InvoiceNumber, and InvoiceTotal. Then, write a SELECT statement that returns all of the columns in the view, sorted by VendorName, where the first letter of the vendor name is N, O, or P.

Answers

Answer:

CREATE VIEW InvoiceBasic  AS

SELECT VendorName, InvoiceNumber, InvoiceTotal  

FROM Invoices JOIN Vendors ON Invoices.InvoiceID = Vendors.VendorID  

WHERE left(VendorName,1) IN ('N' , 'O ' , 'P' )

Explanation:

CREATE VIEW creates a view named InvoiceBasic  

SELECT statements selects columns VendorName, InvoiceNumber and InvoiceTotal   from Invoices table

JOIN is used to combine rows from Invoices and Vendors table, based on a InvoiceID and VendorsID columns.

WHERE clause specified a condition that the first letter of the vendor name is N, O, or P. Here left function is used to extract first character of text from a VendorName column.

1. Describe your Microsoft word skills that need to be improved upon the most. 2. Explain the Microsoft word skills you are most confident in performing. 3. How can your Microsoft word processing skills affect your overall writing skills on the job?

Answers

Answer:

The answer varies from person to person.

Explanation:

All kinds of people are using Word, so people would recognize if the answer if plagiarized. So, simply answer truthfully; no matter h1ow embarrasing.

The Microsoft word skills that I will need to improve upon the most is how to be faster when typing.

It should be noted that the Microsoft word skill that I am mostly confident in performing is the creation of word documents and text formatting.

Lastly, Microsoft word processing skills have affected my overall writing skills on the job as it has helped in improving my writing and grammar.

Learn more about Microsoft on:

https://brainly.com/question/20659068

What are the basic characteristics of object-oriented analysis and design (OOAD)? How does OOAD compare to structured analysis and design (SAD)?

Answers

Answer:

Basic characteristics of OOAD and compression with SAD can be defined as follows:

Explanation:

The Object-oriented analysis is described as a design and analysis system like an application, that uses Oops programming. It is the measurement model, that is the presentation, which became a part of the object-based review.  

The features of OOAD can be defined as follows.  

The complex issues are simply solved.    The operation of very fast recovery.  The stability in condition changes. Its conceptual method for resolving its extremely complex problems.

The difference in OOAD and SAD can be defined as follows:

The OOAD mainly focuses upon the design of objects, it can be used in highly complex logical systems, whereas the SAD focuses on data analysis systems and processes.  The OOAD uses the framework to target data, but the SAD is process-oriented. It uses class and UML diagrams, but SSAD uses DFDs to extract the element, it has many limited steps to prepare and execute, but OOAD relies mostly on initial growth. This method is being developed in the course of the process.

А.
is the highest education degree available at a community college.

Answers

Answer:

The answer is "associate".

Explanation:

The two-year post-school degree is also known as the associate degree, in which the students pursuing any of this degree, which may take as little as 2 years to complete the course, although many prefer to do it at the same rate. Its first two years of a Bachelor (fresh and sophomore years) were covered by an Associate degree.

Write Album's PrintSongsShorterThan() to print all the songs from the album shorter than the value of the parameter songDuration. Use Song's PrintSong() to print the songs.

Answers

Answer:

Here is the function PrintSongsShorterThan() which prints all the songs from the album shorter than the value of the parameter songDuration.

void Album::PrintSongsShorterThan(int songDuration) const {   //function that takes the songDuration as parameter

unsigned int i;  

Song currSong;    //object of Song

cout << "Songs shorter than " << songDuration << " seconds:" << endl;  

for(int i=0; i<albumSongs.size(); i++){    

currSong = albumSongs.at(i);    

if(currSong.GetDuration()<songDuration){    //checks if the song duration of the song from album is less than the value of songDuration

currSong.PrintSong();     } } }  //calls PrintSong method to print all the songs with less than the songDuration

Explanation:  

I will explain the working of the for loop in the above function.

The loop has a variable i that is initialized to 0. The loop continues to execute until the value of i exceeds the albumSongs vector size. The albumSongs is a Song type vector and vector works just like a dynamic array to store sequences.

At each iteration the for loop checks if the value of i is less than the size of albumSongs. If it is true then the statement inside the loop body execute. The at() is a vector function that is used to return a reference to the element at i-th position in the albumSongs.  

So the album song at the i-th index of albumSongs is assigned to the currSong. This currSong works as an instance. Next the if condition checks if that album song's duration is less than the specified value of songDuration. Here the method GetDuration() is used to return the value of duration of the song. If this condition evaluates to true then the printSong method is called using currSong object. The printSong() method has a statement cout << name << " - " << duration << endl; which prints/displays the name of the song with its duration.

If you see the main() function statement:

musicAlbum.PrintSongsShorterThan(210);  

The musicAlbum is the Album object to access the PrintSongsShorterThan(210) The value passed to this method is 210 which means this is the value of the songDuration.

As we know that the parameter of PrintSongsShorterThan method is songDuration. So the duration of each song in albumSongs vector is checked by this function and if the song duration is less than 210 then the name of the song along with its duration is displayed on the output screen.

For example if the album name is Anonymous and the songs name along with their duration are:

ABC 400  

XYZ 123  

CDE 300  

GHI 200  

KLM 100  

Then the above program displays the following output when the user types "quit" after entering the above information.

Anonymous                                                              

Songs shorter than 210 seconds:                                                                         XYZ - 123                                                                                                              

GHI - 200                                                                                                              

KLM - 100  

Notice that the song name ABC and CDE are not displayed because they exceed the songDuration i.e. 210.

Do each of the following in the main function:
a) Write the function prototype for function zero, which takes a double array big_nums and does not return a value.
b) Write the function call for the function in part a.
c) Write the function prototype for function add1AndSum, which takes an integer array one_small and returns an integer.
d) Write the function call for the function described in part c.

Answers

Answer:

a)

void zero(double big_nums[]);  

b)

zero(big_nums)  

c)

int add1AndSum (int one_small[]);

d)

add1AndSum(one_small);

Explanation:

a)

void zero(double big_nums[]);  

in this statement:

zero is the name of the function

void is used as the function does not return a value.

The function zero takes an array parameter i.e. big_nums[]

big_nums is the name of the array

big_nums[] array has a data type double

b)

zero is the name of the function

In part a) function zero has a parameter which is the array big_nums. So in order to call this function an array has to be passed as a parameter to this function.

So in this statmenent zero(big_nums) the array big_nums is passed to the zero function. You can also declare a new  double type array with a different name in main() function and can pass this to the zero function as:

double array[ ] = { 20.6, 30.8, 5.1};

zero(array);

Look at the following program for the better understanding of part a) and b)

#include <iostream>   //for using input output functions

using namespace std;  //to access objects like cin cout

void zero (double big_nums[]);   // function prototype

int main() {  //start of main() function

double a[ ] = { 20.6, 30.8, 5.1};  // double type array a with elements

zero(a);    }   //calls zero function passing array a to the function

void zero(double big_nums[]){      // function zero with double type array big_nums as parameter and the function returns no value

   int i;    

   for(i=0;i<3;++i)     {

        cout<<big_nums[i];     }  }  //prints the elements of array

c)

add1AndSum is the name of the function

int is used as the function does not return an integer.

The function add1AndSum takes an integer array parameter i.e. one_small[]

one_small is the name of the array

one_small[] array has a data type int

d)

add1AndSum is the name of the function

In part c) function add1AndSum has a parameter which is the array one_small. So in order to call this function an array has to be passed as a parameter to this function.

So in this statement add1AndSum(one_small); the array one_small is passed to the add1AndSum function. You can also declare a new  int type array with a different name in main() function and can pass this to the add1AndSum function.

During the name resolution process, which technique is used to avoid congestion when querying a server

Answers

Answer:

"NOT lookup " is the correct approach.

Explanation:

This methodology significantly reduces the quantity of congestion of DNS messages on a certain file. The application establishes that whenever a question reaches if it is processed. Unless the file is loaded, then perhaps the response is returned with the cached cache.Typically the name resolution occurs in something like a DNS File. The conversion usually occurs throughout this cycle from Username to IP, including IP via Username.

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: Question 6 options: A) botnet B) adware. C) a backdoor. D) spyware.

Answers

Answer:

The correct answer is D) Spyware.

Explanation:

Also known as a Malicious Software (or Malware for short), a Spyware is designed to gain unsolicited entrance into ones computer and when executed, performs the function of illegally stealing one's private information and sending them to the hacker or originator of the software.

The following have been identified as spyware threats:

Transponder (vx2) Hot as HellBlazeFindInternet Optimizer

Cheers!

the property of doing work automatically by the computer​

Answers

Answer:

Automation

Explanation:

Ann, a user, reports that she is no longer able to access any network resources. Upon further investigation, a technician notices that her PC is receiving an IP address that is not part of the DHCP scope. Which of the following explains the type of address being assigned?

A. Unicast address
​B. IPV6
​C. DHCP6
D. APIPA

Answers

Answer: APIPA

Explanation:

Automatic Private IP Addressing (APIPA) is a Windows based operating systems feature that allows a computer to assign itself automatically to an IP address even though there is DHCP server to perform the function.

From the information that has been provided in the question, we can see that the type of address that is used is APIPA.

Determine the median paycheck from the following set:

{$100, $250, $300, $400, $600, $650}

$300

$350

$450

$600

Answers

Answer:

My answer to the question is $350.

The middle numbers are $300&$400.

300+400=700/2=350.

Answer:

$350

Explanation:

why is operating system pivotal in teaching and learning

Answers

Answer:

Kindly see explanation

Explanation: The operating system is a huge part of a computer system which plays a an invaluable role in the working of computer programs, hardwares and influences the overall experience of the user. It operating system serves as the interface between the computer hardware itself and the user who may wish to perform different tasks using a computer. In other to teach and learn, it is necessary to input and also obtain output, store our files and process and most essentially one may need to install application programs or softwares, all these functions are made possible with the help of an operating system. In essence, a system without an operating system can perform very little to no function at all. So basically teaching and learning becomes difficult. Teaching and Learning tools such as video, writing and other application softwares cannot be installed without an operating system and thus teaching or learning becomes impossible in it's absence.

You are in the process of building a computer for a user in your organization. You have installed the following components into the computer in Support:AMD Phenom II X4 quad core processor8 GB DDR3 memoryOne SATA hard drive with Windows 7 installedYou need to make sure the new components are installed correctly and functioning properly. You also need to install a new SATA CD/DVD drive and make sure the computer boots successfully.Perform tasks in the following order:Identify and connect any components that are not properly connected.Use the PC tools on the shelf to test for components that are not functioning. Replace any bad components with the known good parts on the shelf.Install the required CD/DVD drive in one of the drive bays and connect the power cable from the power supply.

Answers

Answer:

i would check all connections from the hard drive and power supply and check your motherboard for any missing sauters and or loose no contact connections

Explanation:

what privacy risks do new technologies present,
and how do we decide if they're worth it?

Answers

Answer:

Los riesgos de las nuevas tecnologías se multiplican a medida que nos hacemos dependientes de ellas. También lo hacen a medida que sustituyen a otras formas de contacto social más cercanas

Los riesgos de las nuevas tecnologías son grandes desconocidos. El mal uso de las redes sociales y de Internet en los ordenadores y en el teléfono móvil, entre otros factores, supone un peligro real para todos los estratos de población, pero en especial para los más jóvenes. Pensemos, ¿realmente somos conscientes de los riesgos que suponen las nuevas tecnologías? ¿Sabemos cómo utilizarlas para no ponernos en riesgo?

Cabe destacar que las denominadas nuevas tecnologías de la información y de la comunicación (TICs) son un distintivo de la época actual y se han convertido en herramientas esenciales en las diferentes áreas de la vida. Esto es, para el área académica, laboral, social, de ocio…

En la mayoría de los ámbitos están presentes las TICS, pues incluyen las diferentes herramientas con las que nos manejamos hoy en día: servicios de contacto electrónico (e-mails, servicios de mensajería instantánea, chats), los teléfonos móviles, tablets y ordenadores, las plataformas online de difusión de contenidos, las redes sociales, entre otros..

Explanation:

Which octet of the subnet mask 255.255.255.0 will tell the router the corresponding host ID?The last octetThe first octetThe first and last octetThe middle two octets

Answers

Answer:

The last octet

Explanation:

Here in the question, given the sub net mask, we want to know which octet of the subnet mask will tell the router the corresponding host ID.

The correct answer to this is the last octet. It is the last octet that will tell the router the corresponding host ID

Enum fruit_tag {
BLUEBERRY,
BANANA,
PINEAPPLE,
WATERMELON
};
typedef enum fruit_tag fruit_t;
void printFruit(fruit_t myFruit) {
switch(myFruit) {
case BLUEBERRY:
printf("a blueberry");
break;
case BANANA:
printf("a banana");
break;
case PINEAPPLE:
printf("a pineapple");
break;
case WATERMELON:
printf("a watermelon");
break;
}
}
void compareFruit(fruit_t fruit1, fruit_t fruit2) {
if (fruit1 > fruit2) {
printFruit(fruit1);
printf(" is larger than ");
printFruit(fruit2);
}
else {
printFruit(fruit1);
printf(" is smaller than ");
printFruit(fruit2);
}
}
int main(void) {
fruit_t myFruit = PINEAPPLE;
fruit_t otherFruit = BLUEBERRY;
compareFruit(myFruit, otherFruit);
return 0;
What is the output?

Answers

Answer:

The output is "a pineapple is larger than a blueberry ".

Explanation:

In the given  C language code Enum, typedef, and two methods "printfruit and compareFruit" is declared, that can be defined as follows:

In the enum "fruit_tag" there are multiple fruit name is declared that use as the datatypes. In the next line, the typedef is defined, that enum to define another datatype that is "fruit_t". In the next step, the printFruit method is defined that accepts "myFruit" variable in its parameter and use the switch case to to check value. In the "compareFruit" method, it accepts two parameters and uses the if-else block to check its parameters value and print its value. In the main method,  two variable "myFruit and otherFruit" variable is declared that stores the values and pass into the "compareFruit" method and call the method.

Discuss the different methods of authentication supported between Microsoft’s Web server (Internet Information Services) and the browsers in common use at your organization. Cover both basic authentication and Microsoft’s challenge-response scheme.

Answers

Answer:

Answered below

Explanation:

The Microsoft web server (Internet Information Services) supports the following authentication methods;

1) Basic authentication: This method uses basic authentication to restrict access to files on NTFS-formatted web servers. Access is based on user ID and password.

2) Digest authentication, which uses a challenge-response mechanism where passwords are sent in encrypted formats.

3) Anonymous authentication: In this method, the IIS creates IUSR-computerName account, to authenticate anonymous users.

4) Windows integration uses windows domain accounts for access.

5) .Net passport authentication provides users with security-enhanced access to .Net websites and services.

6) Client certificate mapping where a mapping is created between a certificate and a user account.

The first electric, general-purpose computer, ENIAC, was programmed by calculating algorithms on paper entering code directly into the computer flipping switches by hand using MS-DOS as the operating system

Answers

Complete Question:

The first electric, general-purpose computer, ENIAC, was programmed by?

Group of answer choices.

A. Calculating algorithms on paper.

B. Entering code directly into the computer.

C. Flipping switches by hand.

D. Using MS-DOS as the operating system.

Answer:

C. Flipping switches by hand.

Explanation:

The first electric, general-purpose computer, ENIAC, was programmed by flipping switches by hand.

ENIAC is an acronym for Electronic Numerical Integrator and Computer, it was developed in 1945 by John Mauchly and J. Presber Eckert. ENIAC was used for solving numerical problems or calculation-related tasks by the process of reprogramming.

In order to give the ENIAC a series of machine instructions to follow in the execution of a task, the programmers had to undergo the cumbersome procedure of connecting, removing, reconnecting cables and flipping switches by hand because data couldn't be stored in memory.

what is programming code

Answers

Answer:

Such languages are used to create computer code or program code, the set of instructions forming a computer program which is executed by the computer. This source code is translated into machine code by a compiler or interpreter, so that the computer can execute it to perform its tasks.

Answer:

Writing code,” “coding,” and “programming” are basically interchangeable terms. Broadly speaking, knowing how to write code is the process of creating instructions that tell a computer what to do, and how to do it. Codes are written in various languages, such as javascript, C#, Python, and much more.

hlo samradhiki can we chat in comment section

Which type of user profile is stored in the C:\Users folder and is automatically created when a user logs on to the computer for the first time?

Answers

Answer:

a. Local user profile.

Explanation:

Local user profile is a type of user profile which is stored in the C:\Users folder and is automatically created when a user logs on to the computer for the first time and it is being stored on the local hard disk of the computer.

Generally, in Microsoft windows any change made to the local user profile is peculiar to the user and the host computer on which the change is made.

Hence, local user profiles avails several users the opportunity of sharing a single computer with their respective user settings and data.

Where in the Formula tab on the ribbon would you find the Use in Formula function?
Function library
Formula Auditing
Calculation
Defined Names

Answers

Answer:

Defined Names

Explanation:

Just did it on Edg 2020

The Formula tab on the ribbon can be found in Defined Names in formula function. The correct option is D.

What is formula tab?

The formula tab is where you can insert functions, outline the name, generate the name, review the formula, and so on.

The Formulas tab on the ribbon contains critical and useful functions for creating dynamic reports. Function Library, Defined Names, Formula Auditing, and Calculation are all included.

The Formula tab is where we insert functions, define names, create name ranges, and review formulas. The Formulas tab in the ribbon contains very important and useful functions for creating dynamic reports.

The Formula command is located in the Data group on the Table Tools, Layout tab. When you open a document that contains a formula in Word, the formula automatically updates.

The Formula tab on the ribbon can be found in the formula function's Defined Names.

Thus, the correct option is D.

For more details regarding formula tab, visit:

https://brainly.com/question/20452866

#SPJ5

Write an interactive program to calculate the volume and surface area of a three-dimensional object.

Answers

Answer:

I am writing a Python program:

pi=3.14 #the value of pi is set to 3.14

radius = float(input("Enter the radius of sphere: ")) #prompts user to enter the radius of sphere

surface_area = 4 * pi * radius **2 #computes surface area of sphere

volume = (4.0/3.0) * (pi * radius ** 3) #computes volume of sphere

print("Surface Area of sphere is: ", surface_area) #prints the surface area

print("Volume of sphere is: {:.2f}".format(volume)) #prints the volume        

Explanation:

Please see the attachment for the complete interactive code.

The first three lines of print statement in the attached image give a brief description of the program.

Next the program assigns 3.14 as the value of π (pi). Then the program prompts the user to enter the radius. Then it computes the surface area and volume of sphere using the formulas. Then it prints the resultant values of surface area and volume on output screen.

The psuedocode for this program is given below:

PROGRAM SphereVolume

pi=3.14

NUMBER radius, surface_area, volume  

INPUT radius

COMPUTE volume = (4/3) * pi* radius ^3

COMPUTE surface_area = 4 * pi * radius ^ 2

OUTPUT volume , surface_area

END


​what are the morals and ethics of computer

Answers

Answer:

Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct. Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into three primary influences:

The individual's own personal code.

Any informal code of ethical conduct that exists in the work place.

Exposure to formal codes of ethics.

Explanation:

Agile Software Development is based on Select one: a. Iterative Development b. Both Incremental and Iterative Development c. Incremental Development d. Linear Development

Answers

Answer:

b. Both incremental and iterative development.

Explanation:

Agile software development is based on both incremental and iterative development. It is an iterative method to software delivery in which at the start of a project, software are built incrementally rather than completing and delivering them at once as they near completion.

Incremental development means that various components of the system are developed at different rates and are joined together upon confirmation of completion, while Iterative development means that the team intends to check again components that makes the system with a view to revising and improving on them for optimal performance.

Agile as an approach to software development lay emphasis on incremental delivery(developing system parts at different time), team work, continuous planning and learning, hence encourages rapid and flexible response to change.

"The principle of ______________ states that programs tend to access data and instructions nearby recently used data and instructions."

Answers

Answer:

Locality of reference.

Explanation:

In computing, The principle of locality of reference is the probability of a processor to repeatedly access the same set of memory locations within a small time interval. This reference of locality can be spatially based (repetitive usage of data within the same location on the computer memory), or temporally based (repetitive usage of a particular data or resources within a shot time interval). The ability of some computing system to perform this action increases their predictability, and efficiency of memory hierarchy use, among other abilities.

#Recall that input from a user is always in the form of a string. #Write a function called "input_type" that gets user input and #determines what kind of string the user entered. The user input #will be supplied as an argument to the function like normal. # # - Your function should return "integer" if the string only # contains characters 0-9. # - Your function should return "float" if the string only # contains the numbers 0-9 and at most one period. # - You should return "boolean" if the user enters "True" or # "False". # - Otherwise, you should return "string". #Write your function here!

Answers

Answer:

Here is the Python program:

def input_type(input_string): #function that takes a string as input and returns the type of that string

   try:   #used to test a block of code for input string type              

       if type(eval(input_string)) == float: #if the type of the string is float

           return "float" #function returns float

       elif type(eval(input_string)) == int: #else if the type of the string is int

           return "integer"#function return integers

       elif type(eval(input_string)) == bool:#else if the type of the string is bool

           return "boolean" #function return boolean

   except: #if the type of the string is neither int, bool nor float

       return "string" #function return boolean

#following statements are used to  test the working of the above function

print(input_type(" ")) #prints string

print (input_type ("False")) #prints boolean

print (input_type ("7.432621")) #prints  float

print (input_type("2788"))#prints int

Explanation:

The function input_type() takes a user input and returns the type of that string input the user entered. The user input can be one of the following types:

int which is the data type of an integer for example 1, 2, 3 etc

float which is the data type of a floating point number for example 1.2, 3.4 etc

bool which is the data type of a boolean for example True or False

string that can be characters for example an empty space character " "

try block here is used to generate an exception and it is used to test a block in the code that checks for the type of the user input. The except block here is used to handle that error. This is executed when the try part raises an error.

Inside the try block, the if and elif statements check the type of the string.

if type(eval(input_string)) == float: statement checks if the type of the string is float. Here the eval() method is used to convert the input string because the user input is basically a string value. So this method evaluates the input_string.

type() method is used to return the type of that evaluated user input string. If condition checks if type(eval(input_string)) which is the type of the evaluated input string is equal to float. If this condition evaluates to true then the function returns "float" otherwise it moves to the next elif statement. Similarly the type of the user input is checked for int in elif part and if both these if and elif conditions evaluate to false then the next elif statement is executed that checks the user input to be bool. If all these three if elif statements evaluate to false then the except part executes which returns "string". The program along with its output is attached in a screenshot.    

When a user runs a program in a text-based environment, such as the command line, what determines the order in which things happen?

Answers

Explanation:

In general, when a program runs in text-based environment like command line interface, the program is used for determining the order in which things happen.

As the program runs, the user will not have any choice and he or she can enter the required data.

If the user enters the data in required format then, he/she can get the result or output in desired format.

Other Questions
30 times the square of a nonzero number is equal to eight times the number what is the number Simplify -12w + 7w - 3 - 6 Solve (s)(-3st)(-1/3) If $4000 is borrowed at a rate of 4.75% interest per year, compounded quarterly, find the amount due at the end of the given number of years. (Round your answers to the nearest cent.) What do California homeowners receive to protect equity when a court forces the sale of a house to pay for a judgment 19. For the following unbalanced equation: S (s) O2 (g) H2O (l) ----> H2SO4 (aq) At what temperature (K) does O2 have to be if the volume of the gas is 5.01 L with a pressure of 0.860 atm to produce 17.55 grams of H2SO4 Two trains are moving towards each other on the same railroad track. From this track there's an offshoot piece of railroad the length of which is shorter than the length of the train but longer than the length of one train car. How can the trains pass each other? what is photography 3.24 (4 being repeated) to a fraction Peter Parker is evaluating two different methods for manufacturing spiderwebs. The first option is manufacturing them in his home lab. This will entail purchasing an industrial-grade chemical reactor that costs $450,000. He will have to hire a lab assistant who will initially receive a salary of $60,000 a year, but that salary must be adjusted for inflation every year at an inflation rate of 2.5%. After ten years, the chemical reactor can be sold for $30,000. This lab setup can produce 10,000 cubic meters of spiderwebs per year.The second option is outsourcing all the manufacturing process to a biotech company recently set up by Bruce Banner. In this case, the price of the spiderwebs will be $14 per cubic meter over the next ten years. Since Peter Parker is a broke student, all of this project is being financed by a superhero fund set up by his late friend and mentor Tony Stark. This fund returns 11% annually. Since this is not a commercial endeavor, there are no taxes nor depreciation to consider. Given these data, calculate the unit price of manufacturing spiderwebs in the lab and decide which of the two options makes the most economic sense. Justify your answers with calculations. Find the area of a sector with a central angle of 120 and a diameter of 7.3 cm. Round to the nearest tenth. literacy is prerequisite of development. justify this statement with examples 1. What does it mean to be an American? 22/55 of a number is what percentage of that number Explain the Monarchy before the revolution. A firm has a debt-to-equity ratio of .5 and a market-to-book ratio of 2. What is the ratio of the book value of debt to the market value of equity Marco is conducting an experiment. He knows the wave that he is working with has a wavelength of 32.4 cm. If he measures the frequency as 3 hertz, which statement about the wave is accurate? PLEASE HELP !! (4/5) -50 POINTS- Which statement correctly compares the "Analysis" and "Conclusion" sections of a lab report? inscribed angles. I need answers asap, thank you!