1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anarel [89]
3 years ago
6

Design a module named getNumber, which uses a reference parameter variable to accept an Integer argument. The module should prom

pt the user to enter a number and then store the input in the reference parameter variable.
Computers and Technology
1 answer:
Sergeu [11.5K]3 years ago
5 0

Explanation:

Module getNumber (Integer Ref Value)

Display "Display a number"

Input number

End module

Module main ()

Declare Integer number x = 1

Declare Real number y = 2.5

Display( x, " " ,y)

Call changeUS (x,y)

Display( x, " " ,y)

End module

You might be interested in
______involves encoding information using fewer bits than the original representation Group of answer choices
stepan [7]

Answer:

The answer is "Data compression".

Explanation:

In the given question some information is missing, that is the option of the question, which can be described as follows:  

a) Data mining.

b) Information theory.

c) Data compression.

d) Image reconstruction.

Data compression is the mechanism, in which the bits arranges the data, that is changed. It encodes data, which needs less space is on the drive. It reduces the information instances and storage capacity, and other choices were wrong, which can be described as follows:

  • In option a, Data mining is used in row data searching, that's why it's not correct.
  • In option b, Information theory is used in communication, that's why it is wrong.
  • In option d, Image reconstruction is used in 3D design, that's why it is wrong.
5 0
3 years ago
Python Programming
Phoenix [80]

The python program that creates a Bankaccount class for a Bank ATM that is made up of the customers and has a deposit and withdrawal function is given below:

<h3>Python Code</h3>

# Python program to create Bankaccount class

# with both a deposit() and a withdraw() function

class Bank_Account:

def __init__(self):

 self.balance=0

 print("Hello!!! Welcome to the Deposit & Withdrawal Machine")

def deposit(self):

 amount=float(input("Enter amount to be Deposited: "))

 self.balance += amount

 print("\n Amount Deposited:",amount)

def withdraw(self):

 amount = float(input("Enter amount to be Withdrawn: "))

 if self.balance>=amount:

  self.balance-=amount

  print("\n You Withdrew:", amount)

 else:

  print("\n Insufficient balance ")

def display(self):

 print("\n Net Available Balance=",self.balance)

# Driver code

# creating an object of class

s = Bank_Account()

# Calling functions with that class object

deposit()

s.withdraw()

s.display()

Read more about python programming here:

brainly.com/question/26497128

#SPJ1

8 0
2 years ago
Select the correct answer.
ipn [44]

Answer:

I'm guessing D? i hope its right

5 0
2 years ago
Read 2 more answers
How can you have internet without subscribing to cable?
Svetach [21]
Sorry but you can’t there is now way
7 0
2 years ago
Many major employers routinely monitor the performance of their employees through the computers and telephones they use. Employe
STALIN [3.7K]

Answer:

Employers are allowed to check the number of keystrokes that word processors enter during the day.

Explanation:

An employer is authorized to monitor the activity of its employee when:

  • The employee authorizes it.
  • The employer owns the system to be used.
  • Surveillance is necessary for a strictly professional purpose.

By analyzing the keys pressed per day, the employer can determine the performance provided by its employees, and if they use the company's resources, for non-work purposes.

5 0
3 years ago
Other questions:
  • Before responding to an e-mail from another student in an online course, a student should
    13·2 answers
  • What is the communications activity of the Internet called
    15·1 answer
  • Which is the process that a wireless router uses to translate a private ip address on internal traffic to a routable address for
    14·1 answer
  • If i'm wanting to use hydra on linux to crack a password and the issue regarding hashes occurs, what shall i do?
    12·1 answer
  • In the cases of int, byte, long, short (In Java) Can you give the heirachy in ascending order?​
    6·1 answer
  • You have just starting working at Quantum Company. As a new programmer, you have been asked to review and correct various pseudo
    14·1 answer
  • (TCO C) When a remote user attempts to dial in to the network, the network access server (NAS) queries the TACACS+ server. If th
    14·1 answer
  • To change the name of a field, press and hold or right-click the column heading for the field, tap or click ____ on the shortcut
    7·1 answer
  • What did Bakers wear (1) in the Portugal does (2) when was author was young ???
    10·1 answer
  • In which of the following stages of the development process is a team MOST likely to interview a potential user of an app?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!