A program checks to see if the input is valid using
numbers
operators
logic
output​

Answers

Answer 1

Use the knowledge in computational language in python program checks to see if the input is output​.

How to define input in Python?

In Python, we do this using the input() function, which is literally 'input' in English. The input() function receives as a parameter a string that will be shown as an aid to the user, usually informing him what kind of data the program is expecting to receive.

So in an easier way we have that the code is:

def isNumber(x):

   if type(x) == int:

        return True

   else:

        return False

input1 = 122

input2 = '122'

if isNumber(input1):

   print("Integer")

else:

   print("String")

if isNumber(input2):

   print("Integer")

else:

   print("String")

See more about python at brainly.com/question/18502436

A Program Checks To See If The Input Is Valid Using Numbers Operators Logic Output

Related Questions

Create a file using any word processing program or text editor. Write an application that displays the files, name, containing folder, size, and time of last modification. Save the file as FileStatisits.java

Answers

Answer:

below is a Shell I have ;

1.Import java.nio.file.*;

2.Import java.nio.file attribute.*;

3.Import java.10 Exception;

4.public class FileStatistics

5.{

6.public static void main(string []args)

7.{

8.path file=

9.

paths.get("C:\\Java\\chapter.13\\TestData.txt")

10.try

11.{

12.\\declare count and then display path, file, name and folder name.

13.

14.

15.

16.\\declare a BasicFileAttributes object, then add statements to display the file's size and creation time.

17.

18.}

19.

20.catch (10 Exception e)

21.{

22.\\add display 10 Exception

23.

24.}

25.}

When using [EmployeeID] as the unique identifier of the Employee table, [EmployeeID] is an example of which of the following?

a. Key attribute
b. Foreign key
c. Primary key
d. Composite key

Answers

Using [EmployeeID] as the unique identifier of the Employee table is an example of: c. Primary key.

What is a primary key?

In database management system (DBMS), a primary key can be defined as a field whose value uniquely identifies each record in a table or relational database.

This ultimately implies that, [EmployeeID] is an example of a primary key because it serves as the unique identifier of the Employee table.

In conclusion, a primary key is simply used as a unique identifier of each record in a table or relational database in database management system (DBMS).

Read more on primary key here: https://brainly.com/question/8131854

Data in the form of digits is called

Answers

Numeric data because it consist of numbers

Specification which has little effect on the speed of a processor is

Answers

Answer:

Specification which has little effect on the speed of a processor is cache system bus speed clock speed socket type. 

Specification which has little effect on the speed of a processor is cache system bus speed clock speed socket type.

What is Specification?

A specification is frequently used to refer to a list of requirements that must be met by a material, design, good, or service. A specification is frequently a form of technical standard.

There are various forms of technical or engineering specifications (specs), and the term is used in various technical contexts in various ways. They frequently make reference to specific papers or information included in them.

The general definition of the word specification is "to state explicitly or in detail" or "to be particular." A requirement specification is a set of requirements that must be met by a certain type of product, service, design, or other element.

Therefore, Specification which has little effect on the speed of a processor is cache system bus speed clock speed socket type.

To learn more about Specification, refer to the link:

https://brainly.com/question/27900839

#SPJ3

Mr. Hicks is setting up a wiiſed office network for 10 computers. He needs to use a network topology
devices to be added later as required. Which topology should he use?
A. Star
B.tree
C.mesh
D.ring

Answers

Answer:

C. Mesh

Explanation:

Each device will be connected to the other 9 devices, making it the best topology to use.

Hope this helps!

Answer:

STAR

Explanation:

To add a Wrap Text command to your document in Word Online, what is the first step you need to take?

Group of answer choices

Select the Format tab.

Select the image on your document to trigger the Picture Tools Format tab.

Select the Insert tab.

Select the Wrap Text command, and choose how the text will wrap around an image.

Answers

Answer:

Select the Wrap Text command, and choose how the text will wrap around an image.

Explanation:

What app or divice has a filter that you can have blackvalk in real life

Answers

Answer:

look in app store explanation:

look in-app store

i need answer for multiple choice . Someone help me.....pls.....everyone have online?

Answers

Answer:

I believe that your correct answer to that question is C. Logistics Information System. The Logistics subsystem deals with activities such as purchasing, receiving inventory control, and distribution. This concept sometimes requires certain components of the organization to operate sub-optimally in order to achieve the maximum goals of the system.

Explanation:

I got my information for this answer from www.examveda.com. If there are any further questions, please put them below in the comments, and I will try my best to help you out. If not, please have a great rest of your day/night. :)

why do we use case 1 and case 0 in nested switch statement before writing embedded switch statement

Answers

Explanation:

The fundamental difference between if-else and switch statements is that the if-else statement “selects the execution of the statements based upon the evaluation of the expression in if statements”. The switch statements “selects the execution of the statement often according to a keyboard command”.

Have a great day. <3

what is the instruction phase of the central processing unit​

Answers

Answer:

The instruction cycle (also known as the fetch–decode–execute cycle, or simply the fetch-execute cycle) is the cycle that the central processing unit (CPU) follows from boot-up until the computer has shut down in order to process instructions.

Does anyone know how to get past this part in Lego Harry Potter it’s the one right after Dobby in year 2? I’m so stuck!!!

Answers

thats a nice game. i dont know how to play it. how are you doing?

Which function can be used to insert the current date into a spreadsheet?
DATE
TODAY
MM/DD/YYYY
DATE&TIME
Help please

Answers

Answer:

its MM/DD/YYYY

Explanation:

How can I get multiple user inputs in Java ? I want to be able to use it for subtraction, addition,division and multiplication.For example it should run like
How many numbers do you want to subtract?
4
Enter 4 numbers:
1
2
3
4
result:-8

Answers

You can do something like this :

Scanner sc = new Scanner(System.in);
int[] nums = new int[4];

for(int i = 0; i < nums.length; i++) {
System.out.println("Enter next number: ");
nums[i] = sc.nextInt();

What exactly is github?

Answers

GitHub is a code hosting platform for version control and collaboration.

It lets you and others work together on projects from anywhere.

Explanation:

Hope it helps you!!

What rules should we have about cell phone
the classroom/school?.

THIS IS AN 5 PARAGRAPH ESSAY HELP ME

Answers

Introduction: There are many rules schools should follow when it comes to cell phone use during school hours. Technology can be very distracting and durning school is when kids need to pay attention. Most people see cell phone rules un fair or bad, however it's not like that. The school just wants what's best for the students and so they can learn, which will ultimately help them on later in life.

Body paragraphs (wont write the rest of the paragraphs but heres some ideas) Only using the phone when needed like if it's an emergency, phones have to stay on silent to not disrupt others, during free period you can choose whether to be on your phone

then you write your conclusion based on what you wrote

Most of the Info you would need:

-If we don't allow cellphones many school issues would be solved.

-There is a mistake if they use cellphone, but its a great mistake if they misuse.

- Phones in classes just defeat the point of going to school- for learning.

- There are benefits, yes, but there is no doubt that the privilege will be abused.

-Cell phones are only good for distracting the students from the education that they are at school to obtain.

- we think it is one of the best ways to get distracted during class to use your cellphone.

-Cell phones create massive and on going classroom management issues for teachers.

-There is no need for allowing students to use mobile phones in schools. Ultimately they are not using mobiles for the calling purpose. Thus it is a perfect no from our side.

Please have a good day <3

Business Rules constraints falls into two categories:

Answers

Business-rules constraints fall into two categories: field constraints within tables, and. relationship constraints between tables.

How do I write this program?

def goingUp(n): # prints the stars from the row with 1 until a row with n

def goingDown(n): # prints the stars from the row with n to the row with 1

If the user enters a negative value, your program should print nothing.

If the user enters 0, your program should print nothing.

If the user enters 1, your program should print a single line with one star.

If the user enters any number greater than 1, your program should print according to the pattern shown above.

The prompt to the user must be Please enter a value

Answers

Answer:

Sorry but I don't know this

There are 5 participants in a Symmetric Key system and they all wish to communicate with each other in a secure fashion using Symmetric Keys without compromising security. What's the minimum number of Symmetric Keys needed for this scenario keeping in mind that each pair of participants uses a different key

Answers

Answer:

10 keys.

Explanation:

There are 5*4/2 = 10 pairs in a group of 5. You need that many keys.

Every member of the group will have 4 keys.

If you draw 5 dots on a piece of paper and connect each one with a line, you'll be drawing 10 lines. Each line needs a key.

6.1.5: Function definition: Volume of a pyramid.


Define a function calc_pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base.

Sample output with inputs: 4.5 2.1 3.0
Volume for 4.5, 2.1, 3.0 is: 9.45
Relevant geometry equations:
Volume = base area x height x 1/3
Base area = base length x base width.

Answers

Answer:

def calc_pyramid_volume(base_length, base_width, pyramid_height):

   return (base_length*base_width*pyramid_height*1/3)

The code given below is in Java as it calculates the volume of the pyramid by creating the function. The base length as well as the base width, and the pyramid height has been passed as the parameters to the function.

The function of calc_pyramid_volume with parameters base_length.

//Main.java

public class Main

{

public static void main(String[] args) {

//Initialize the variables

double base_length = 4.5;

double base_width = 2.1;

double pyramid_height = 3.0;

//Call the the function with the given parameters

System.out.printf("Volume for %.1f, %.1f, %.1f is: %.2f", base_length, base_width, pyramid_height

, pyramid_volume(base_length, base_width, pyramid_height));}

Therefore,

//function that takes length, width and height as parameters and returns the volume

public static double pyramid_volume(double base_length, double base_width, double pyramid_height) {

//calculate the base area by multiplying the base length and base width

double base_area = base_length * base_width;

Learn more about pyramid on:

https://brainly.com/question/13057463

#SPJ2

UCLA Extension's marketing department wants
to study the effectiveness of their email
campaign. The department surveyed 40
students randomly selected from a contact
database. The survey shows 26 of the 40
students surveyed enrolled in one course
because of reading the email. 8 of the 40
enrolled in three courses after reading the
email, and 6 of the 40 did not enroll even after reading the email.

The effectiveness of the email campaign is measured by course enrollment. Can you calculate the mean as a measure of central tendency
reading the email?

Answers

The measure of central tendency to determine the effectiveness can be the mean, median or mode

It is true that you can calculate the mean as a measure of central tendency for reading the email

How to determine the true statement?

The survey result is given as:

Sample size, n = 40Enrolled in one course = 26Enrolled in three courses = 8Not enrolled = 6

To determine if the email is effective or not, we simply carry out a test of significance.

However, if the central of tendency is to be used to determine the effectiveness; it is best to use the mean.

Hence, it is true that you can calculate the mean as a measure of central tendency for reading the email

Read more about measure of central tendency at:

https://brainly.com/question/17631693

4. How would you reorder the animation on a slide using the Reorder
Animation tool?

Answers

Answer:

should be an undo button on the top bar

Explanation:

I hope this helps

In 1972, earlier designers built the
connecting major universities. The broke
communications into smaller chunks, or
and sent them in a first come, first serve
1
basis. The limit to the amount of bytes of data that can be moved is called line capacity, or
When a network is met its capacity the user experiences
When the
network is "slowing down", what is happening is users are waiting for their packet to leave the
To make the queues smaller, developers created
packets to move
L
1
1
data
:: ARPANET
:: bandwidth
:: packets
:: simultaneously
:: queue
:: mixed
:: unwanted pauses

Answers

The exercise is about filling in the gaps and is related to the History of the ARPANET.

What is the History of the ARPANET?

From the text:

In 1972, earlier designers built the ARPANET connecting major universities. They broke communication into smaller chunks, or packets and sent them on a first-come, first-serve basis. The limit to the number of bytes of data that can be moved is called line capacity, or bandwidth.

When a network is met its capacity the user experiences unwanted pauses. When the network is "slowing down", what is happening is users are waiting for their packet to leave the queue.

To make the queues smaller, developers created mixed packets to move simultaneously.

Learn more about the ARPANET at:
https://brainly.com/question/16433876

What is the purpose of linking text boxes?

Answers

The answer that the person answered is the same answer I was gonna answer so Yh it’s correct

do you think film is a great media in exposing information?​

Answers

not really everything don’t need to be on the internet

Answer:I think film is a great media in exposing information

Explanation:Films are great for exposing information for many reasons. Films are long, which increases the chance the watcher will remember, also it makes the watcher more involved and more interactive

List one unprofessional AND one professional example of internet/social media

Answers

Professional: Using social media to advertise a company you created

Unprofessional: Using social media to watch cat videos

The professional use of social media involves the use for job posting, while the unprofessional use involves watching videos.

What is social media?

A social media is given as the network that forms the connections of the individuals over the internet. It enables the user to connect irrespective of borders.

The use of social media has been professional and unprofessional both. The professional use of social media involves the use for job posting, while the unprofessional use involves watching videos.

Learn more about social media, here:

https://brainly.com/question/9564823

#SPJ5

When you run your Windows Form application, what is the lifespan of a global variable (also known as a "field" or "class" variable)?

Answers

The lifespan of a global variable (also known as a "field" or "class" variable) exist only until any additional classes are initialized.

What is Windows form application?

Windows Forms is defined as a form of UI backbone that is often uused for creating Windows desktop apps.

It is known to help its user in a lot of ways to produce or make  desktop apps using  the visual designer given in Visual Studio. It has a lot of Functionality such as drag-and-drop placement of visual controls and others.

See full question below

When you run your Windows Form application, what is the lifespanof a global variable (also known as a “field” or “class”variable)?

a. during the initial click button event

b. global variables only exist if they are constants

c. only until any additional classes are initialized

d.as long as the form is running

Learn more about Windows  from

https://brainly.com/question/26420125

Question 2:
(5 marks)
According to the following code; you are required to draw the flowchart in details with
clear sequences
message=input("enter yes if there is message in the inbox");
attached=input("\n enter yes if there is attachment");
inbox=eval (input ("enter number of email"));
while inbox > 0:
if message=="yes":
print ("extract the message");
if attached=="yes":
print("extract the message");
email=input("eneter v for valied or not");
if email=="V":
print ("extract attached ");
print("inject Job ");
print("inject Submission");
en email=="N":
print("Inject an error");
print ("Remove the inbox mail ");
inbox-inbox-1;
DIO:
print("stop")

Answers

Flowcharts are visual representations of a code or program segments

How to draw the flowchart?

To draw the flowchart, we make use of the following symbols and figures

Oval: To begin and end the flowchartParallelogram: To accept input for the message, attached, inbox & email variables Parallelogram: To display all outputsRectangle: To perform the arithmetic operation; inbox = inbox - 1Diamond: To make several decisions and to initiate a loop process

See attachment for the flowchart that represents the code

Read more about flowcharts at:

https://brainly.com/question/24735155

What is the difference between conceptual architecture view and module architecture view?

Answers

Answer:

The conceptual architecture view provides a high-level map of how the system performs what it's meant to do, and the module architecture view demonstrates how the software's major parts are translated to modules and subsystems.

Explanation:

does anyone know what blue holler is if so, what are the new tracks?

Answers

Answer:

No

Explanation:

No I don't know about it sorry

I act as the provider of electricity in an electromagnet. What am I?" (2 words) D__ C____

Answers

Answer:

loudspeaker and a electric motor

Explanation:

you just needed the answer right?

Other Questions
Which expressions represent rational numbers? select all the apply. startroot 100 endroot startroot 100 endroot 13.5 startroot 81 endroot startroot 9 endroot startroot 729 endroot startroot 64 endroot startroot 353 endroot one-third startroot 216 endroot three-fifths 2.5 Q4 In Slaughterhouse Five, What will be the climax of the novel?Select one:a. the attack on Pearl Harborb. the bombing of Dresdenc. D-Dayd. V-Day Mt. Everest, the tallest mountain in the world, is 29,029 ft tall. K2, the worlds second tallest mountain is 28,251 ft tall. How much taller is Mt. Everest than K2? President Truman mentioned the United Nations commission on human rights during his speech to the NAACP in order to show? someone help me please The area of a rectangular piece of metal is 1,984 square centimeters. The perimeter is 188 centimeters. What are the dimensions of the piece? How long does it take for gums to heal after tooth extraction. Every month, Jim makes $49 less than his best friend Keenan.Let m represent the amount of money that Jim makes every monthand let d represent the amount of money that Keenan makes everymonth.Write an equation to represent the relationship between m and d. Typical household bleach has a ph of 13. what is the h3o concentration in household bleach? round to the nearest hundredth. 10n m n = The software that requests mail delivery from the mail server to an Internet device is known as mail ____ software. hello people ~Give the ratio in which hydrogen and oxygen are present in water by volume.(a) 1:2(b) 1:1(c) 2:1(d) 1:8 8. Who was the schoolteacher who helped educate the public about the poorliving conditions of the mentally ill?A. Dorothea DixC. George CatlinB. Samuel Gridley Howe D. Thomas Gallaudet NEED ANSWERS QUICK! CORRECT ANSWER GETS BRAINLIESTFind the quotient of 4 5/8 and 2 1/2. Express your answer in the simplest form. Pleassee helpp, find X. C in neeeee your help thank you ASAP will give brainliest!Lenin's fight against capitalism was focused on the struggle between:1. oppressed classes and the interests of the people.2. workers and the interests of the people.3. capitalists and the bourgeois4. capitalists and landowners. 08.02 mc the function Why did European countries find it necessary to have colonies? Please quickWhy is it important to design field studies that will not make wild animals associate humans with food? You have a substance with a length of 2 cm, width of 3 cm, and a height of 4 cm. Its density is known to be .5 g/cm3. What is the mass of the sample you have?