1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Black_prince [1.1K]
4 years ago
5

Assume that a text box named PhoneNumberTextBox appears on a form and contains the phone number 414-555-5555. What value will di

splay for the length of the phone number text box?
Computers and Technology
1 answer:
Nitella [24]4 years ago
8 0

Answer:

def PhoneNumberTextBox (integer):

         print(len(integer))

PhoneNumberTextBox ("414-555-5555")

Run the code and the length of the phone number text box will be 12.

Explanation:

The value for the length of the phone text box can be known using a programming language to decipher the length. For example let write a function to allow the computer get the length of the number with python.

def PhoneNumberTextBox (integer):

We write the function to accept an argument known as integer.

print(len(integer))

We print the length of the integer . The len function compute the length of the argument  written . The print function displays the length of the argument.

PhoneNumberTextBox ("414-555-5555")

We call the function and insert the integer in form of a string to get the length. when we run the function the length of the number is 12.

You might be interested in
Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo
diamong [38]

Answer:(C) Anyone with access to the personal computers could log on to the mainframe.

Explanation:

It is no doubt that log on procedures are cumbersome so what most users do is that they store log on sequences in their computer so that they could use the main frame facilities whenever they access it the second time.

Here we have to identify the associated risk with this approach.

This process could lead to access of the computer system to users and thereby making all the data available in the system vulnerable. So option C is correct.

option (A) is incorrect as the back up option who also be affected when the system is accessible to anyone.

option (B) is incorrect because it has nothing to do anything with training of the personnel.

option (D) is incorrect because it one has nothing to do with the physical system what vulnerable reside is inside the system.

7 0
3 years ago
What does cramming to hand in an assignment
Vikki [24]
Honestly gotta say cramming in an assignment doesnt help at all

5 0
3 years ago
An app builder has created a report for sales people to view records from the custom object, some users have complained that the
Mila [183]

Answer:

There is a need for some people to see the total transparency of the records that are meant to be shared with a select group of people. There are certain things that can be done for this. The first one is that the sharing rules should be checked. To whom are the details shared with. The next one is the filters that are used.

These can be reported and changed accordingly. Lastly, the whole organization’s defaults can be checked. This is something that can be done when the previous methods that were done did not work that well. Once some changes are done, the people can check if they already work and if the records can be viewed.

Explanation:

8 0
3 years ago
16. The process of using a computer to write, design, and assemble documents is called
julia-pushkina [17]
It is called D. destkop pulishing
With desktop publishing, people will had the options to choose a certain layout from the destkop publishing software that allow them to create high quality document in shorter period of time. This software allow individuals to publish on their own without the need of printing press.
3 0
3 years ago
Read 2 more answers
Examine about the Internal & External Fragmentation methods give an example for each. essay​
Tju [1.3M]

Internal Fragmentation occurs when a process needs more space than the size of allotted memory block or use less space. External Fragmentation occurs when a process is removed from the main memory. Internal Fragmentation occurs when Paging is employed. External Fragmentation occurs when Segmentation is employed.

3 0
3 years ago
Other questions:
  • Discuss how and why video game hardware affects game design and where you think the next generation of platforms will change tho
    9·1 answer
  • Conventional prescription eyeglasses are considered sufficient PPE for eye protection. A) True B) False
    11·1 answer
  • Using ______, a smartphone can connect to an automobile audio/control system
    6·1 answer
  • FOR 15 POINTS AND BRAINLIEST!<br> What are the possible consequences of Invasion of privacy?
    8·1 answer
  • You have installed five new 300 GB disk drives into a server running Windows Server 2012. You want to create a volume that will
    15·1 answer
  • A USB flash drive uses solid
    7·1 answer
  • TRUE OR FALSE: If I ask you to span multiple rows in your table, that means that two columns will merge together
    5·1 answer
  • What are the pros and cons of using the Internet for researching career information?
    14·2 answers
  • A __________ note is a private note that you leave for yourself or for other people who might use the presentation file
    9·1 answer
  • PLEASE SOMEONE PLEASE HELP ME OUT!!!!
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!