3.4 lesson practice quiz edhesive
:
Write a program to check if user inputs "yellow"
Answer:
In Python:
col = input("Enter Color: ")
if col == "yellow":
print("True")
else:
print("False")
Explanation:
This prompts the user for color
col = input("Enter Color: ")
This checks if color is yellow
if col == "yellow":
If true, this prints true
print("True")
If otherwise, this prints false
else:
print("False")
Answer:
The right answer is: Option A. h3
Explanation:
The purpose of using selectors in CSS is to find the elements in the HTML page to which the formatting will be applied.
Different type of selectors are used in CSS.
In the given code, h3 is the selector.
All the <h3> elements on the page will be of orange color and will have font size 12.
Hence,
The right answer is: Option A. h3
Answer:
The main objects of a head frame, or poppet head, are to support the winding pulley firmly and to guide the cage above the surface to the discharging stage.
Answer:
See explaination
Explanation:
void showSeatingChart(string seatingChart[20][40], const int ROWS, const int COLS){
for(int i = 0;i<ROWS;i++){
for(int j = 0;j<COLS;j++){
cout<<seatingChart[i][j]<<" ";
}
cout<<endl;
}
}
Answer:
1. True
2. True
3. False
4. False
Explanation:
1. Information integrity is a term in computer business that describes the degree of accuracy, reliability and dependency of an information content, process and system.
The main purpose of Information integrity is to prevent or protect information from accidental or intentional but unauthorized changes.
Hence, it helps to ensure that data can be modified only by appropriate mechanism.
2. Pairing threats with vulnerabilities is a pair of risk analysis, that sets to determine the type of vulnerabilities a system or organization has, which can be paired with valid threats. Hence, the kind of risk involved in the vulnerability threats, can then be addressed.
3. Knowledge based identification (authentication) system which involves password or PIN are the most common form of authentication methods. Ranges from different devices such as phones and PC to platform such as website.
4. Biometric is a type of user authentication that relies on the measurement and calculation of the shape of the body, such as fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. It is often referred to as Physiological characteristics of Biometric system.