can you wite the in pyth ,please? There's a sample out put
Q: What is the output of the following code snippet? int size=2; stack s; s.push("Tom");…
A: Stack works by LIFO (last in first out) principle.
Q: w this and cide cor
A: I give the code in python(because you have not specified any particular language ) for the above…
Q: 14. The Do Not Call Registry applies to what type of marketing? A. Telemarketing. B. Email…
A: The question is related to the Do Not Call Registry, which is a registry of phone numbers in the…
Q: 10. Which of the following strategies is a company's best bet to avoid having to notify residents of…
A: One of the best ways to safeguard personal data from unauthorised access in the event of a data…
Q: Write a pattern for token of your own Mobile phone number?
A: The pattern for a phone number is generally digits with a few special characters allowed. The “Hayes…
Q: drracke
A: Define function countDigit with parameter n. Use cond to check if the number entered is less than…
Q: (a) Describe the differences among short-term, medium-te long-term scheduler.
A: Lets see the solution.
Q: Which of the following is a limitation of table driven agents? Look up table too large to generate…
A: Given:- Which of the following is a limitation of table driven agents?
Q: When designing a magazine, the Adobe "page layout" software application where everything comes…
A: Answers: The CORRECT Option is D ( InDesign) *) Create audio, video, slideshows, and animations…
Q: Traverse the following graph using BFS and DFS 3 D 7 9 A 3 5 F
A: In BFS we traverse left to right on the same level before going in-depth or down. In DFS first depth…
Q: 33. The backlash against “adult” websites demonstrates which of the following principles about…
A: The pushback against "adult" or sexually explicit websites serves as an example of the idea that…
Q: 13. Under the Electronic Communications Privacy Act ("ECPA"), when may a person lawfully monitor…
A: Under the Electronic Communications Privacy Act ECPA, a person may lawfully monitor another's…
Q: For the SIC/XE object code given below in hexadecimal format, answer the question that follows
A: What is the instruction format? The instruction format for SIC/XE architecture consists of 3 parts:…
Q: Which of the following XML documents correspond to this representation?
A: Consider the given data :
Q: 75. Which of the following is not a term used to describe a method of acquiring personal identifying…
A: Cybercriminals utilise human engineering, often referred to as social engineering, as a strategy to…
Q: 44. Did the pharmacy commit a violation of HIPAA's Privacy Rule? A. No, the insurance identification…
A: Correct answer and incorrect answers are explained
Q: Consider the following algorithm Algorithm Mystery(A[0..n-1, 0..n - 1]) //Input: A matrix A[0..n-1,…
A: Given : Algorithm Mystery(A[0..n-1, 0..n - 1])//Input: A matrix A[0..n-1, 0..n - 1] of real…
Q: 28. You receive phone calls every day with prerecorded messages from Ticketmaster promoting Cardi…
A: The Telephone Consumer Protection Act (TCPA) forbids businesses from calling consumers via…
Q: 3. The National Do Not Call Registry is primarily enforced by which two entities through their…
A: Telemarketing is defined as the process of virtually selling products or services through the…
Q: Which of the following statements are true? If the solution lies deep in the tree, then BFS is…
A: DFS might be faster if the searched element is typically relatively deep. So option 1 is wrong…
Q: 39. Which of the following can be considered "personal data" as defined under GDPR? A. Avatar B.…
A: Correct answer is given below. Please note appropriate explanation for incorrect answers is given as…
Q: How is a c Sogi
A: Step 1: The card game different from an 8 puzzle game in terms of environment?
Q: 15. Which of the following in a statute (such as the FCRA), enables an individual to directly bring…
A: Answer is explained below in detail
Q: The materials manager at Tricky Pee Furniture Company maintains a list of suppliers for each of the…
A: We need to create table and fill sample data for the given schema.
Q: Which of FSK's parameters has been changed as a result of this change?
A: Introduction: The FSK (Frequency Shift Keying) is a form of digital modulation that is widely used…
Q: Construct a Java program to provide a file named file.txt if it does not exist. Write 100 integers…
A: import java.io.*; import java.util.*; public class Random1 { public static void…
Q: 29. The Fair Credit Reporting Act has regulations, of some variety, for all of the following…
A: The Fair Credit Reporting Act (FCRA) is a federal law that governs the collection, disclosure, and…
Q: 4. One of the lessons that can be derived from the Equifax Data Breach is that companies should…
A: Millions of people's personal information was compromised in 2017's huge cyberattack known as the…
Q: 0. In the healthcare sector, cybersecurity through IoT devices like wireless insulin pumps hich…
A: Correct mcq answer is explained below Please note explaination for incorrect answers is also given
Q: 34. Which rule within the HIPAA Privacy Rule requires transfer of only the protected health…
A: In this question we need to choose the correct HIPAA privacy rule which requires transfer of the…
Q: 49. Which of the following does not constitute directory information under FERPA? A. Legal Aspects…
A: Under the Family Educational Rights and Privacy Act (FERPA), directory information refers to…
Q: 0. In considering humanity of privacy, we can think about the exchange of information as ransaction…
A: Answer and explanation is given below
Q: ERD 3: The data requirements of the library application are summarized as follows: BOOK entity is…
A: Actually, database is a used to stores the data.
Q: While a database analyst or administrator would primarily interact with a database through [ Select)…
A: Language is one of the most widely used programming language which has been used to create different…
Q: You are tasked with designing the arithmetic unit of the following ALU. The ALU operations are: •…
A: Below I have provided the handwritten solution to the given question
Q: 79. In some revenge porn cases, victims have been able to successfully recover damages from…
A: Copyright infringement occurs when someone uses someone else's copyrighted work without permission.…
Q: protection wien of the espect ‘testimonial” by many courts to examine the issue? A. Your ATM PIN. 3.…
A: Answer is given below in detail
Q: What is the difference between a BYE and a CANCEL method?
A: Task :- differentiate between the BYE and CANCEL methods.
can you wite the in pyth ,please? There's a sample out put
Trending now
This is a popular solution!
Step by step
Solved in 3 steps with 3 images
- A(n) is a variable that is used within a function. Select one: a.operator b.property C.parameter d.methodJava Functions with No Parameters but with Return Values Create a function named askInput that asks the user an integer input if called. The function will return the ASCII value of the character. In the main function, call the askInput function and store the returned value in a variable and print the variable. Input 1. One line containing a character Output Enter a character: + 43Create a function, declare and define a static variable in it! Increase the value of the variable and print it out. Call the function in the main() several times! What's happening? ( in C language)
- Writing Functions that Return a Value Summary In this lab, you complete a partially written Python program that includes a function that returns a value. The program is a simple calculator that prompts the user for two numbers and an operator ( +, -, *, or / ). The two numbers and the operator are passed to the function where the appropriate arithmetic operation is performed. The result is then returned to where the arithmetic operation and result are displayed. For example, if the user enters 3, 4, and *, the following is displayed: 3 * 4 = 12 The source code file provided for this lab includes the necessary input and output statements. Comments are included in the file to help you write the remainder of the program. Instructions Write the Python statements as indicated by the comments. Execute the program.The first line of a function declaration ends with a colon in Python. True or false? Functions with No Parameters ArtShow.py 2 ArtShow.py - This program determines if an art show attendee gets a Summary 5% discount for preregistering. 4 Input: Interactive. In this lab, you complete a partially prewritten Python program that includes a function 5 Output: A statement telling the user if they get a discount or no discount. with no parameters. 7 The program asks the user if they have preregistered for art show tickets. If the user 8 # Write discount function here. 9. has preregistered, the program should call a function named discount() that 10 displays the message "You are preregistered and qualify for a 5% discount." If the 11 # Write noDiscount function here. user has not preregistered, the program should call a function named noDiscount () 12 that displays the message "Sorry, you did not preregister and do not qualify for a 13 if -_name__ == '__main__': 5% discount." 14 registerString = input("Did you preregister? Enter Y or N: ") 15 16 # Test input here. If Y, call…
- Help me create a working java program using functions on this problem please give it to me step by step, so I can understand. Thank you :)write python code for functions:The scope of a function contains.. a. all variables defined within the function and the function parameters. b. all variables defined within the function but not the function parameters c. all variables in the program no matter where they are defined. d. only the function parameters
- Function Name: compliments Parameters: answer1 - a boolean (True or False) representing whether the user is "smart" answer2 - a boolean (True or False) representing whether the user is "awesome" answer3 - a boolean (True or False) representing whether the user is "fun" Description: Write a function that outputs a string of compliments based on the adjectives selected by the inputs. Use the inputs True and False. The function should return the string “You are” concatenated with the compliments that are true. The three compliments should be: "smart" "awesome" and "fun". If none of the compliments are true, print the string “Goodbye.” instead. Test Cases: >>>compliments(True, True, True) You are smart awesome fun. >>>compliments(False, True, False) You are awesome. >>>compliments(False, False, False) Goodbye.done in c++ Program Specifications: Write a program that asks for a user's name and age, finds the ticket price based on the age, and prints out the user's name, age, and ticket price. The program must define the following 3 functions and call them in the main function. Create a function called getName that takes in no arguments and returns the name of the user. Create a function called getAge that takes in the argument age and uses pass-by-reference to set the age of the user. Ensure that the user cannot put in an age that is negative or greater than 100. Create a function called printTicket that takes in the user's name and age and does the following ○ If they are less than or equal to 13 years old set ticket_Price to 9.99. ○ If their age is greater than 13 and less than 65, set ticket_Price to 19.99. ○ If their age is greater than or equal to 65, set ticket_Price to 12.99. ○ Output to the console the user's name, age and ticket price.Choice the correct answe