1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Otrada [13]
2 years ago
12

Qn 1) Use only Python Programming language for the below question.

Computers and Technology
1 answer:
Readme [11.4K]2 years ago
6 0

Using the knowledge of computational language in python we can write definitions of some functions that will be useful to organize the personal information of a person.

<h3>Writing this code in python we have:</h3>

<em>class Address:</em>

<em>      def __init__(self, street, num):</em>

<em>        self.street_name = street</em>

<em>        self.number = num</em>

<em>class CampusAddress(Address):</em>

<em>       def __init__(self,of_num,c_street="Hougang",c_num=77):</em>

<em>        self.office_number=of_num </em>

<em>        Address.__init__(self,c_street,c_num) </em>

<em>sally_addr = CampusAddress('8745 5951') </em>

<em>print(sally_addr.office_number)</em>

<em>print(sally_addr.street_name)</em>

<em>print(sally_addr.number)</em>

<em>print()</em>

<em>my_addr = CampusAddress('1111 1111','streaks',99)</em>

<em>print(my_addr.office_number)</em>

<em>print(my_addr.street_name)</em>

<em>print(my_addr.number)</em>

See more about python at brainly.com/question/23271145

#SPJ1

You might be interested in
Why is it difficult to enforce laws against intellectual theft?
LiRa [457]

Answer:

A-because most of the victims of intellectual theft are individuals  

Explanation:

Its definitely the first, and not B., C, or D,

Countries are no barrier in catching the theft, as almost all the countries now have issued the online identification number of each of their citizens. However, some of them are in the process. Hence, for next one - two years we can add add the B as well:

B-because much intellectual theft is committed in other countries

However, as this work is complete, the B option will not be an issue related to intellectual theft analysis and control.

And  C and D are definitely not the part of the answer, as associations like FCC USA, Internet association etc  are technically sound enough, and quite good to fight a case under any law as well.

7 0
3 years ago
Both tangible and intangible property? are not covered by intellectual property protections. are both covered by intellectual pr
LiRa [457]

Answer:

B -both covered by intellectual property protections.

Explanation:

3 0
3 years ago
What's a big question or problem in the tech field you'd like to solve and why?
aleksandrvk [35]

A big question or problem in the tech field that i would like to solve is Data security.

<h3>What is Data security ?</h3>

Data security  can be regarded as process of protecting data from unauthorized user as well as protection from  data corruption .

I will like to solve this problem because as advances in technology, the data of individual or organization is not been total secured and this is posing so much loss to individuals.

Data security are;

  • data encryption
  • hashing
  • tokenization

Learn more about Data security at;

brainly.com/question/17493537

5 0
2 years ago
Look at the logic program below. Set a breakpoint after each commented instruction. You can also single step through the program
Goshia [24]

Using programming knowledge, it is possible to use programming logic, we can differentiate and find the terms

<h3>Writing the code and understanding the programming logic:</h3>

<em>.data</em>

<em>sourceword:</em>

<em>.word 0xAB</em>

<em>wordmask:</em>

<em>.word 0xCF</em>

<em>operand:</em>

<em>.long 0xAA</em>

<em>.text</em>

<em>.globl _start</em>

<em>_start:</em>

<em>movw sourceword, %ax # ax=0x00AB ( move the word value of sourceword =0x00AB to ax register.)</em>

<em>movw %ax, %bx # bx=0x00AB ( copy the value of ax to bx register.)</em>

<em>xorw %cx, %cx # cx=0000 ( cx=cx XOR cx, that is clear cx register.)</em>

<em />

<em>andw wordmask, %ax # ax=0x008B ( ax=ax AND wordmask= 0x00AB AND 0x00CF= 0x008B)</em>

<em>orw wordmask, %bx # bx=0x00EF (bx=bx OR wordmask= 0x00AB OR 0x00CF= 0x00EF.)</em>

<em>xorw wordmask, %cx # cx=0x00CF (cx=cx XOR wordmask= 0x0000 XOR 0x00CF=0x00CF.)</em>

<em />

<em>movl operand, %eax # eax=0x000000AA. ( copy the 32-bit value of operand=0x000000AA to eax.)</em>

<em>movl %eax, %ebx # ebx=0x000000AA.( copy the value of eax to ebx.)</em>

<em>movl %eax, %ecx # ecx=0x000000AA. ( copy the value of eax to ecx.)</em>

<em />

<em>shll $3,%eax # eax=0x00000550. ( logical shift left of eax=0x000000AA by 3 bits.)</em>

<em />

<em># 0x000000AA=00000000000000000000000010101010</em>

<em />

<em># =>00000000000000000000010101010000=0x00000550.</em>

<em />

<em>rorl $4,%ebx # ebx=0xA000000A. (Rotate right ebx=0x000000AA by 4 bits.)</em>

<em />

<em># 0x000000AA=00000000000000000000000010101010</em>

<em />

<em>3 =>10100000000000000000000000001010= 0xA000000A.</em>

<em />

<em>sarl %ecx # here the count value to shift the bits not mentioned.</em>

<em />

<em># It is the arithmetic shift right instruction. the shifted left bits filled with MSB bit.</em>

See more about logic program at brainly.com/question/14970713

#SPJ1

5 0
2 years ago
The best ways to navigate through your computer? a)Start button b)My Computer c)Windows explorer d)All of the above​
melomori [17]

Answer:

d all of above cause from tht all we can navigate through our pc

7 0
3 years ago
Other questions:
  • What are two fundamental components of data structures?
    10·1 answer
  • "what windows process is responsible for authenticating users?"
    12·1 answer
  • What does the Additional Clock tab do?
    11·1 answer
  • The _____ class can be used to get user input using dialog boxes.
    14·1 answer
  • A(n) ______ system is a set of programs that coordinates all the activities among computer or mobile device hardware. a. managem
    10·1 answer
  • Your company runs several databases on a single MySQL instance. They need to take backups of a specific database at regular inte
    12·1 answer
  • What was the history of technology since the 1980s to now and how is it used in classrooms?.?. PLEASE HELP
    13·1 answer
  • Snap Me on <br>samxavier.18​
    12·2 answers
  • JAVA
    12·1 answer
  • Structured query language (sql) enables data analysts to _____ the information in a database.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!