1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gemiola [76]
3 years ago
12

Design and implement an application that uses dialog boxes to obtain two integer values (one dialog box for each value) and disp

lay the sum and product of the values. Use another dialog box to see whether the user wants to process another pair of values.
Computers and Technology
1 answer:
dybincka [34]3 years ago
7 0

Answer: hey

Explanation:

You might be interested in
Heads or tails
Pani-rosa [81]

import random

heads = 0

tails = 0

i = 0

while i < 1000:

   rnd_value = random.randint(1, 2)

   if rnd_value == 1:

       heads += 1

       print("heads")

   else:

       tails += 1

       print("tails")

   i += 1

print("Heads appeared {} times and tails appeared {} times".format(heads, tails))

I hope this helps!

5 0
3 years ago
File Account.java contains a definition for a simple bank account class with methods to withdraw, deposit, get the balance and a
puteri [66]

The answer & explanation for this question is given in the attachment below.

Download docx
5 0
3 years ago
How are computers classified into different types? Explain ​
zloy xaker [14]

Answer:

On the basis of size there are four types of computer. They are minicomputer, micro computer, mainframe computer and super computer. Super computer is the fastest, most expensive, big in size, and most powerful computer that can perform multiple tasks within no second.

3 0
2 years ago
LITERALLY PLS ANYONE!!! 90 pointsss!
Doss [256]

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

6 0
3 years ago
Read 2 more answers
What is the purpose of a system call in an operating system?
ikadub [295]

Answer:

 The system call is the programming way for executing the requesting the services in the program from kernel in the particular operating system.

The main purpose of the system call in the operating system is that it basically provide the different types of the services to the users by using the API (Application program interface) system.

It basically provide the interface for allowing the users to request the services between the operating system and a processor. In the linux there are basically three types of system call are as follows:

  • Fork
  • Waitpid
  • Exist

6 0
3 years ago
Other questions:
  • How do solar system and galaxies differ?
    9·1 answer
  • A date consists of a month, day, and year. Consider the class Date of such dates. Suppose that Date represents the month, day, a
    14·1 answer
  • Select all that apply.
    5·1 answer
  • How does having weak security on your browser represent the weakest link in a network
    8·1 answer
  • .... is a way to engage people at different locations in synchronous interaction ( fill in the blank space)​
    14·1 answer
  • Before her shift as a cashier at the grocery store, Carla pulls her hair back into a ponytail and makes sure her fingernails are
    15·2 answers
  • Who wont me???????????????
    6·2 answers
  • Sub to splashy
    14·2 answers
  • CODEHS- Can someone please help me with this! It is due tomorrow.
    11·1 answer
  • In windows, you use _____ to reorder, move, and navigate between folders.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!