1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vadim26 [7]
3 years ago
12

Can someone please help me with this question?

Computers and Technology
1 answer:
madreJ [45]3 years ago
5 0
I would use a biometric machine that scans a fingerprint and a eye retina then calls up my bank information from the scan. Who wants to carry a card around anyway?
You might be interested in
WHERE DO I GO TO DO THIS AND WHAT DO I WRITE?????
faust18 [17]

You can just look up "python ide online" on google and paste this code:

n = -1

count = 0

while n < 0:

   n = int(input("We're checking to see if a number is prime or not! Enter a positive number: "))

if n % 2 == 0:

   if n == 2:

       print("{} is a prime number".format(n))

   else:

       print("{} is not a prime number".format(n))

else:

   for x in range(n, 1, -1):

       if n % x == 0:

           count += 1

   if count > 1 or n == 1:

       print("{} is not a prime number".format(n))

   else:

       print("{} is a prime number".format(n))

I've written some code that checks to see if a number entered by the user is a prime number or not.

Sorry, but I'm not too good with pseudocode plans and all that. I hope this helps.

8 0
3 years ago
Read 2 more answers
The function below takes a single argument: data_list, a list containing a mix of strings and numbers. The function tries to use
Doss [256]

Answer:

def filter_strings(data_list):

   string_list = []

   for s in data_list:

       if type(s) == str and len(s) > 5:

           string_list.append(s)

   return string_list

Explanation:

Create a function called filter_strings that takes data_list as a parameter

Initialize a new list to hold the strings that are longer than 5 characters

Initialize a for loop that iterates through the data_list

Check the elements if they are string - use type function, and if their length is greater than 5 - use len function. If an element satisfies the both conditions, put it to the string_list

When the loop is done, return the string_list

6 0
3 years ago
Which of the following is not true about designing classes? In order for class information to be printed instead of a memory add
Leokris [45]
'<span>All methods should be declared private</span>' is not true for classes. One should be able to change the properties of objects, and to do this safely and in a controlled manner, some public methods are declared. Some private methods can also be declared for more potentially sensitive operations for being called from within the class. 
6 0
3 years ago
Variables defined inside a member function of a class have: Block scope. Class or block scope, depending on whether the binary s
Snowcat [4.5K]

Answer:

The answer is "Block scope".

Explanation:

In the programming, the scope is a code, in which it provides the variable ability to exist and not be retrieved beyond variable. In this, the variables could be defined in 3 locations, that can be described as follows:

  • Inside a method or the block, which is also known as a local variable.
  • Outside of the method scope, which is also known as a global variable.
  • Defining parameters for functions known as formal parameters.
8 0
4 years ago
________ is the extent to which differences in observed scale scores reflect true differences among objects on the characteristi
AysviL [449]

Answer: Validity

Explanation:Validity is the type of claim that is made towards the measuring of reliability of any element. The differences appearing in the measurement of the elements displays the validly factor is not up to the mark which indirectly implies that reliability is not high. Validity is the situation in which all the parameters appearing in the element is perfect. If validity is perfect then only perfect reliability is achieved.

7 0
4 years ago
Other questions:
  • Click _______ to add a new column to a table.
    6·2 answers
  • How can cybercriminals harm a person whose personal information they have stolen
    7·1 answer
  • What hex value is the standard indicator for jpeg graphics files?​?
    6·1 answer
  • Which tag will you use if you want your web page to look the same as your source code?
    11·1 answer
  • Web pages are accessed through a software program called a _____.A) ​web crawlerB) ​web browserC) ​web serverD) ​web app drawer
    5·1 answer
  • Select the TRUE statement from those listed below. (Select 1)(1pts) Question 11 - Select the TRUE statement from those listed be
    14·1 answer
  • Design a class named Employee. The class should keep the following information in member variables:
    5·1 answer
  • Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address
    13·1 answer
  • If the user does NOT click the button what color will "topButton" be when this program finishes running?
    6·1 answer
  • provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses,
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!