1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LekaFEV [45]
3 years ago
11

Programming Project 6: GUI program

Computers and Technology
1 answer:
mel-nik [20]3 years ago
5 0

Answer:

Explanation:

So i have issues typing it here, because it keeps saying trouble uploading your answer as a result of inappropriate words/links, so i will just make a screenshot of it.......

Just save the the above code in python file and execute it, you should arrive at your answer.

Attached below is the code and sample screenshot of what you should expect

cheers !!!!

You might be interested in
Which constraints is applied to a group of fillets that are created by specifying the same radius?
Umnica [9.8K]

- The status of a part that is not constrained to a specified size or shape. Parts are rigid bodies by .... A selection setting used during creation of 3D fillets. .... A group of individual iMates, selected and named in the browser, that are to be used as a unit. ... A fillet that has the same radius along its entire length.

4 0
4 years ago
Read 2 more answers
Write a note on antispyware progrmaes?​
MAXImum [283]

Answer: See explanation

Explanation:

Spyware refers to the software that has

a malicious behavior which gathers information about an individual or organization and then sends the information gathered to another entity which is used in causing harms to the user such as the privacy violation of the user.

Antispyware programmes are also called the spyware removal tools and they're the software which are used in the detection of harmful spyware which are then removed from the system. Examples include Avira, Norton, Avast, McAfee etc.

5 0
3 years ago
In your own words, describe UML. Identify at least two types of UML diagrams that can be used in software development; describe
lora16 [44]

<u>Uml (Unified Modified Language):</u>

In those days before software development normally we used flow chart, which will have Start, Process, Conditions and Stop, Modified version of flow chart is called UML (Unified Modified Language).

UML is standard model language which help develop understand flow of the software. Uml (Unified Modified Language).

There are 7 type of diagram is used in Uml (Unified Modified Language).

  • Class Diagram.
  • Object Diagram.
  • Component Diagram.
  • Composite Structure Diagram.
  • Deployment Diagram.
  • Package Diagram.
  • Profile Diagram.

I will suggest profile diagram and class diagram.

  • Profile diagram – This diagram is just to define use role and user rights.
  • Class diagram: - This diagram explains the class and their uses in the software development.
7 0
4 years ago
Technology that verifies a person's identity is _____. a smart card Automated Fingerprint Verification an EPD a digital ink pen
tresset_1 [31]
The answer is Automated fingerprint.
 Automated Fingerprint is the process that verifies a person's identity. It is primarily used for law enforcement agencies for criminal identification initiatives. It is important because it includes identifying a person suspected of committing a crime or linking suspects to unsolved crimes. 

3 0
3 years ago
Read 2 more answers
List 7 ways of generating<br>airlines​
rjkz [21]

Answer:

1. <em>impr</em><em>ove</em><em> </em><em>air</em><em> </em><em>qua</em><em>lity</em><em>.</em><em>.</em>

<em>2</em><em>. </em><em>Eats</em><em> </em><em>food</em><em> </em><em>rich </em><em>in</em><em> </em><em>antio</em><em>xidants</em><em>.</em><em>.</em><em>.</em>

<em>3</em><em>. </em><em>Stop</em><em> </em><em>smok</em><em>ing</em><em>.</em><em>.</em><em>.</em><em>.</em>

6 0
3 years ago
Read 2 more answers
Other questions:
  • All of the following are types of data storage devices except CD/DVD computer monitor digital cameras flash drive
    15·1 answer
  • If you could make any blog, what would it be about and why?
    9·1 answer
  • A(n) _____ uses spatial and nonspatial data and specialized techniques for storing coordinates of networks of lines (roads, rive
    8·1 answer
  • To display a pop-up form for a control, such as account number in a datasheet create a user interface (UI) macro that is associa
    12·1 answer
  • Which two statements are true about the Data Sync functionality? (Choose two.)
    15·1 answer
  • Define the terms candidate key and primary key. Explain the difference between a primary key and a candidate key.
    9·1 answer
  • What kind of music you guys play
    5·2 answers
  • Look at the following code:
    7·1 answer
  • What is ana absolute adress
    11·1 answer
  • You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customer
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!