1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leviafan [203]
3 years ago
11

Develop a Python program. Define a class in Python and use it to create an object and display its components. Define a Student c

lass with the following components (attributes):  Name  Student number  Number of courses current semester
Computers and Technology
1 answer:
AlexFokin [52]3 years ago
8 0

Answer:

  1. class Student:
  2.    def __init__(self, Name, Student_Num, NumCourse):
  3.        self.Name = Name  
  4.        self.Student_Num = Student_Num  
  5.        self.NumCourse = NumCourse  
  6. s1 = Student("Kelly", 12345, 4)
  7. print(s1.Name)
  8. print(s1.Student_Num)
  9. print(s1.NumCourse)

Explanation:

Firstly, use the keyword "class" to create a Student class.

Next, create a class constructor (__init__) that takes input for student name, student number and number of course (Line 2) and assign the input to the three class attributes (Line 3-5). All the three class attributes are preceded with keyword self.

Next, create a student object (Line 7) and at last print all the attributes (Line 8-10).

You might be interested in
Ms. Myers commented that _____ she slept in at the hotel was better than _____ she slept in at home.
nirvana33 [79]
The bed/ the bed is the answer
6 0
3 years ago
TLS is not generally compatible with SSL because:__________. 1. SSL is proprietary while TLS is open 2. SSL can interact with it
kodGreya [7K]

Answer:

2. SSL can interact with its earlier versions which is a vulnerability

Explanation:

TLS (Transport Layer Security) and SSL (Secure Sockets Layer) are both used for providing data authentication and encryption between networking devices  (such as servers, PCs and applications) operating over a network. The iterations of SSL were versions 1.0, 2.0 and 3.0. But then, all these iterations had security issues and so TLS 1.0 was released to improve on those security flaws. And seeing that SSL can interact with its earlier versions which are all vulnerable, downgrading TLS to SSL for compatibility sake will abuse the essence of TLS in the first place.

6 0
3 years ago
Modifying the column widths usually is done last because other formatting changes may affect the size of data in the cells in th
iren2701 [21]
That statement is True.

Modifying column early will be a waste of time because the data may not be displayed if the width is not suitable. So it best to do this after all the data has been entered

hope this helps
3 0
3 years ago
Una pregunta cuales son los ataques de Sindel que por favor y me lo diga gracias
Len [333]
I do not know spanish please say in english
5 0
3 years ago
Why might you use a navigation form instead of tab pages? The navigation form allows for several levels and sublevels to be coll
boyakko [2]

Answer:

Access includes a Navigation Control that makes it easy to switch between various forms and reports in your database. A navigation form is simply a form that contains a Navigation Control. Navigation forms are a great addition to any desktop database.

Explanation:

yes

3 0
3 years ago
Read 2 more answers
Other questions:
  • Let's say that you handle the IT systems administration for your company. There's a server inside of your organization that chec
    14·1 answer
  • 4. When emergency changes have to be made to systems, the system software may have to be modified before changes to the requirem
    13·1 answer
  • What channel will the republian debate be broadcast on?
    6·2 answers
  • Derived Classes Warrior Stores the warrior's allegiance as a string. The warrior does not attack warriors that have the same all
    14·1 answer
  • “You have been blocked”
    5·2 answers
  • Why do you think Google+'s engagement levels are so low? Do you think they will rise as people become more familiar with the soc
    12·1 answer
  • What type of data is not defined and does not follow a specified format and is typically free-form text such as emails, Twitter
    13·1 answer
  • Encryption is the key to keeping your personal information secure online.<br><br> True<br><br> False
    11·1 answer
  • A network administrator is attempting to troubleshoot an issue regarding certificates on a secure website. During the troublesho
    8·1 answer
  • Write the necessary preprocessor directive to enable the use of the stream manipulators like setw and setprecision Additional No
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!