Answer:
The correct option to the following question is an option (A) Inheritance.
Explanation:
Because Inheritance is the feature in which the child class can obtain the properties of the parent class.
So, that's why this option is true.
Morphing is not the model of object-oriented database and it is the effect in which we create our images with those who look like as I'm.
So, that's why this option is false.
Duplication is not the model of the object-oriented database and it is a process in which we create the image as like that thing.
So, that's why this option is false.
Cloning is also much like the duplication and it is also not the model of the object-oriented database.
So, that's why this option is false.
<span>
If Johanna wants to label the x and y axes in an Excel chart, she should click anywhere on the chart, then click on the Layout tab. Under Labels, she should click on Axis Titles, and select the Secondary Horizontal Axis Title for x axis or <span>Secondary Vertical Axis Title for y axis. She should then select the text that is in the Axis Title box, and type the title name that she wants.</span></span>
Answer:
value=int(input("Enter the value from where the user wants to starts: "))#Take the value from the user.
i=1#intialize the value of a variable by 1.
while(value<1000) and (i<9):#while loop which prints the value.
print(value,end=" ")# print the value.
value=value*2#calculate the value to print.
i=i+1#calculate the value for the count.
Output:
If the user enter 5, then the output is : "5 10 20 40 80 160 320 640".
If the user enter 5, then the output is : "3 6 12 24 48 96 192 384".
Explanation:
- The above code is in python language, in which the first line of the program is used to render a message to the user, take the input from the user and store it into value variable after converting it into an integer.
- Then the loop will calculate the double value and then it prints the value with the help of print function.
- The end function puts the spaces between numbers.
Cyberbullying is bullying that takes place over digital devices like cell phones, ... posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else ... as well as any negative, mean, or hurtful content
Path. In *nix the dirname command can be used to isolate it.