1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amid [387]
3 years ago
13

Write an expression that will cause the following code to print "I am a teenager" if the value of userAge is less than 20. Zyboo

ks won't let me edit any other line, and UserAge > 20 was marked wrong. It won't accept the ≥ symbol either.

Computers and Technology
1 answer:
VikaD [51]3 years ago
6 0

Answer:

Replace

if userAge > 20

with

userAge > 19

Explanation:

if userAge > 20  checks if age is 21, 22, 23, 24........

The else condition which prints "I am a teenager" checks if age is 20, 19, 18....

Notice that 20 is inclusive of the else condition; this shouldn't be because for userAge to be less than 20, 20 isn't inclusive

To solve this,

Replace if userAge > 20 with userAge > 19

So that, the else

The else condition which prints "I am a teenager" checks if age is 19, 18, 17, 16....

You might be interested in
What are rules that we use on the internet called, and what are some of them?
dusya [7]
Like safety rules like what to do privacy, plagarizim, and  cyberbullying and what not. Just stuff like that.
5 0
3 years ago
What is bandwidth? the speed at which data can be transferred from your wireless modem. a measurement of how much information ca
EleoNora [17]
<span>Bandwith is a measurement of the amount of data that can be up or downloaded at a give time, generally measured in seconds, over either a wireless or wired communication link.</span>
3 0
4 years ago
Which of the following would determine how many elements are in values?
DiKsa [7]
I guess depends on the language but for both java and C++ answer 3 is correct.
3 0
3 years ago
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replic
mihalych1998 [28]

Answer:

The answer is "Option D".

Explanation:

Trojan program is a malicious code that is also known as a virus. It is a rootkit, that aims to infect the computer to hide or obscure an object. These programs are mainly used to download additional content, such as additional pieces of malware, to the infected computer, and other options are wrong that can be defined as follows:

  • In option A, It is not correct, this option infects the system.
  • In option B, It is used for infects another computer that's why it is incorrect.
  • In option C, It is incorrect because it is used in cybersecurity.  
5 0
3 years ago
You have configured a LAN with 25 workstations, three network printers, and two servers. The workstations and printers will have
Kisachek [45]

Answer:

install and configure on the server DHCP (Dynamic Host Configuration Protocol)

Explanation:

In this scenario, you should install and configure on the server DHCP (Dynamic Host Configuration Protocol), this protocol automatically assigns each individual PC a unique IP address and DNS server information. This protocol has various configuration options such as being able to set a range for the IP addresses so that they can be used by different devices in the system. It also allows you to directly set the subnet and passage gateway so that all of the workstations can quickly communicate with one another and quickly be targeted by the administration.

7 0
3 years ago
Other questions:
  • Brad teaches an accounting class, and he created a PowerPoint presentation from a Word outline for his class. This Word outline
    14·1 answer
  • Information goes into a computer through _______ and comes our through _______
    6·2 answers
  • List five ways in which the type declaration system of a language such as Java or C differs from the data definition language us
    8·1 answer
  • ___ is the amount of data that a storage device can move from the storage medium to the computer per second.
    11·1 answer
  • Differences between barcode reader and character recognition devices​
    9·2 answers
  • Computer trespass can be harmless.<br> a. True<br> b. False
    15·2 answers
  • . 。 • ゚ 。 .
    10·2 answers
  • Which of the following is a method which can be used to delete a page from a publication?
    6·1 answer
  • PROCEDURE: Therapeutic infusion of saline solution with 5% dextrose IV, 500 ml for dehydration, lasting 48 minutes. what is the
    13·1 answer
  • What is a major advantage of medical simulators?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!