1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leto [7]
2 years ago
12

Lilyana has written the following function, but nothing happens when she runs her program. What has she forgotten to do?

Computers and Technology
1 answer:
Alex17521 [72]2 years ago
8 0

In this question, when Lilyana write a program to calculate the area, <em><u>she forgot to call the method</u></em> that's why it will not give any output. so, complete code with the output can be defined as follows:  

Program Explanation:

  • Defining a method "area" that takes two variables "length, height" in the parameters.
  • Inside the method, a variable "area" is declared that calculates the area by multiplies "length and width".
  • After calculating the area a return keyword is used that returns its value.
  • Outside the method, a print method is declared that calls the area method by accepting value into its parameters.

Program:

def area(length, height):#defining a method area that takes two parameters "length, height"

   area = length * height#defining a variable area that calculates the area by multiplies length and width

   return area#using return keyword that returns area value

print(area(6,8))#using a print method that calls area method by accepting the value

Output:

Please find the attached file.

Learn more:

brainly.com/question/8908120

You might be interested in
Questions
allsm [11]

Answer:

intrusion detection

Explanation:

The internet content filter is not going to check whether you are not welcome to any site, and that is done by intrusion detection, and hence, this is not performed by the internet content filter. However, content inspection, malware inspection, and URL filtering are performed by the internet content filter.

4 0
3 years ago
I will make you brainless just answer all this question!!​
Taya2010 [7]

Answer:

I have make this question please answer this

Explanation:

#carryonlearning

8 0
3 years ago
What sort of technique would you use to sort 10,000 items using just 1000 available slot in your RAM?
beks73 [17]

Answer:

d. Merge sort

Explanation:

Merge sort is example of an efficient sorting alogrithm. The Divide and conquer rule is used in this technique. This method breakdown the list into multiple sublists and each sublist contains a single element. This technique merged in the form of sorted lists. This technique uses external memory of the system while sorting.

Merge sort is used to sort the 10,000 items using only 1,000 slots available in the RAM.

5 0
3 years ago
Austin has a report due at school tomorrow, but has not started working on it yet. Now he is worried about getting a bad grade.
liq [111]

Answer:

Explanation:

Question One

He could have read other sites with other points of view and summarized that. Most importantly he could have used footnotes that gave credit to every idea that he used.

He could have put the material down and begin to write. The words would have come out in his awkward style. He would still need to footnote the ideas. That is most important.

Question Two

It is both. Plagiarism is a serious crime if it involves many people being affected by what he wrote.

But it is totally unethical at any level. Trying to pass off something that isn't yours is totally unethical. It should never be done. It shames the subject which is shown to be unimportant and it shames the instructor (he knew enough to catch the plagiarism), and it shames the person getting caught.

3 0
3 years ago
Use the provided MS-Excel template to note entries for each .pcap file in Wireshark that are of interest, as well as your assess
zhenek [66]

Answer:You should note entries for each PCAP file in Wireshark that are of interest as from ENCM 369 at ... file in Wireshark that are of interest, as well as your assessment of potential vulnerabilities. Such vulnerabilities might be due to plaintext data exchange between two machines, which might be exploitable by session hijacking, ...

Explanation:

4 0
3 years ago
Other questions:
  • What are some ways social media networks make money from users
    10·1 answer
  • Will upvote!
    12·1 answer
  • Prodeff, an online project management software, is available at a price of $1 per use. The software requires the user to enter t
    13·1 answer
  • Which of the follow represents a form of disruptive technology? Tend to open new markets and destroy old ones A new way of doing
    11·1 answer
  • Which programming language is good for 14 year old like me​
    12·2 answers
  • The local emergency manager has the responsibility for coordinating emergency management programs and activities. A local emerge
    7·1 answer
  • What was used to enhance silent films of the early 1900s
    15·1 answer
  • JPG is considered a lossy file format. What does this mean?
    15·2 answers
  • 2. Sherry bought the following articles
    7·1 answer
  • (50 POINTS!) Type the correct answer in the box.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!