1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleonysh [2.5K]
2 years ago
12

Part 2: Code the Program

Computers and Technology
1 answer:
miss Akunina [59]2 years ago
5 0

Answer:

You can try something like this:

# YOUR NAME

# May 16th 2022

# This program

def main():

   age = input("Enter your name: ")

   

   if not age.isnumeric():

       print('Invalid input.')

       return

       

   if (int(age) >= 18):

       print('You are an adult.')

   else:

       print('You are a minor.')

main()

You might be interested in
2 What Java keyword is used to create a subclass? interface. extends. implements. inherits.
n200080 [17]

Answer:

extends

Explanation:

When you create a subclass, you basically say "I'm creating a new class, but for now it will look and behave the same as that other class", then you add its own personality.

The syntax is:

class SubClass extends SuperClass

Where SubClass is your new subclass what inherits methods and variables from the SuperClass.

So, if you add nothing to the SubClass, it will be a carbon copy of the SuperClass. But you can add methods and variables exclusive to this SubClass that the SuperClass won't have.

5 0
3 years ago
We love him, because he ."
Andre45 [30]
We love him, because he “is everything I need.” I’m kinda confused on the answer lemme know if you need help
7 0
3 years ago
What is TLB for? Why TLB? Given the following number, what is theeffective memory access time?
vodomira [7]

Answer:

A lookaside buffer translation (TLB) is a memory cache that reduces the time it takes to access a user memory place. TLB includes the most lately used page table entries.

TLB is used to overcome the issue of sizes at the time of paging. Page Table Entry (PTE) is used for framing the memory ,but it uses two references one for finding  the frame number and the other for the address specified by frame number.

<u>Formula for finding effective memory access time-</u>

Effective Memory Access Time = (TLB access_time+Memory Access Time)*hit ratio + (TLB access_time+2*Memory Access Time)*(miss ratio)

Given in question,

Hit ratio = 0.90

Memory Access Time = 150ns

TLB access time= 5ns

Effective Memory Access Time = (TLB access_time+Memory Access Time)*hit ratio + (TLB access_time+2*Memory Access Time)*(miss ratio)

                            =(5+150) * 0.90 + (5+2*150)*(1-0.90)

                             =155 * 0.90 + (305*0.1)

                             =139.5 + 30.5

                             = 170ns

8 0
3 years ago
Types of cybercrime​
sergij07 [2.7K]

Answer:

Types of cybercrime

Here are some specific examples of the different types of cybercrime:

*Email and internet fraud.

*Identity fraud (where personal information is stolen and used).

*Theft of financial or card payment data.

*Theft and sale of corporate data.

*Cyberextortion (demanding money to prevent a threatened attack).

*Ransomware attacks (a type of cyberextortion).

*Cryptojacking (where hackers mine cryptocurrency using resources they do not own).

*Cyberespionage (where hackers access government or company data).

Most cybercrime falls under two main categories:

*Criminal activity that targets

*Criminal activity that uses computers to commit other crimes.

Explanation:

8 0
3 years ago
Read 2 more answers
Can anyone help me out with my photography questions?
Oliga [24]
Verifying, The answer above me is correct
6 0
2 years ago
Other questions:
  • Write a program which selects two integer numbers randomly, adds the numbers and asks the user to enter the answer and then chec
    13·1 answer
  • Write a loop that prints each country's population in country_pop. Sample output with input:
    7·1 answer
  • As the demand for goods and services decreases, job growth.
    14·2 answers
  • A third party intercepting a packet and downloading its information before it is sent onward toward its destination is called
    10·1 answer
  • Which button could Pamela press in the Microsoft Word spell checker to make the word “colour” instantly change to “color” whenev
    11·1 answer
  • In what type of cluster does every server perform useful work so that if one fails, the remaining servers take on the additional
    7·1 answer
  • As with most professions, photography comes with its own unique set of terms and jargon. Identify at least four different words
    5·1 answer
  • Which statement best describes the refraction of light
    9·1 answer
  • My brainly has broke- XD
    11·1 answer
  • "last month, our sales rose when we increased prices by 15%, so we should raise our prices another 15% this month." which logica
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!