1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ne4ueva [31]
3 years ago
11

Forms often allow a user to enter an integer. Write a program that takes in a string representing an integer as input, and outpu

ts yes if every character is a digit 0-9.
Computers and Technology
2 answers:
Bond [772]3 years ago
7 0

Answer:

user_string = input("Input a string : ")

output = user_string.isnumeric()

if output == True:

   print("yes")

else:

   print("no")

Explanation:

  • First of all check whether user input have all numeric value or not .
  • Display yes if string contain all numeric values .
  • Display no if string contain at least one non - integer character .

evablogger [386]3 years ago
4 0

Answer:

text = input("enter a value: ")

if text.isdigit():

       print("yes")

Explanation:

The program is written in python.

text = input("enter a value: ")  This expression prompt the user to input  a string value containing any form of character . The inputted character might be letters, digits etc.

if text.isdigit():

This check if the inputted value is a digit .

print("yes")

if the value is a digit the system will display yes.  

You might be interested in
Computer identity theft differs from theft in the real world in what major way?
CaHeK987 [17]

Answer:

The answer is B

5 0
3 years ago
Read 2 more answers
Which of the following is usually used to connect a monitor to a computer?
viva [34]

Answer:

DVI cable

Explanation:

DVI is for video signals.

Some monitors have a usb hub built in and therefore also have a USB connection, but that is not their primary function.

5 0
3 years ago
Read 2 more answers
5. Bits are sent over a communications channel in packets of 12. (a) If the probability of a bit being corrupted over this chann
user100 [1]

Answer:

0.889

Explanation:

7 0
3 years ago
What is the volume of the prism?
qaws [65]
I think 15 I'm not for sure..
8 0
3 years ago
you have just finished developing a new application. before putting it on the website for users to download, you want to provide
Nostrana [21]

If you have just finished developing a new application, but before putting it on the website for users to download, you want to provide a checksum to verify that the object has not been modified, a process which you must implement is: C. Code signing.

<h3>What is SDLC?</h3>

SDLC is an abbreviation for software development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality software programs.

<h3>What is code signing?</h3>

In Computer technology, code signing can be defined as a process through which software developer and computer programmers digitally sign executable software codes and scripts in order to confirm the author of the software, as well as guaranteeing that the software code has not been altered (modified) or corrupted, especially through the use of a cryptographic hash so as to validate authenticity and integrity.

In this context, we can reasonably infer and logically deduce that it is important for software developer and computer programmers to implement code signing before making a software available for download on a website.

Read more on software development here: brainly.com/question/28262663

#SPJ1

Complete Question:

You have just finished developing a new application. Before putting it on the website for users to download, you want to provide a checksum to verify that the object has not been modified.

Which of the following would you implement?

answer choices

Normalization

Code obfuscation

Code signing

Memory management

3 0
1 year ago
Other questions:
  • To add and remove chart elements, you can use the add chart element button in the charts layout group on the ____ tab.
    6·1 answer
  • Google, Yahoo, and Microsoft search all use the same Web crawler.
    13·2 answers
  • Help!!!! ASAP TIMED TEST 50 points!!!!
    7·1 answer
  • The problem with the media giving equal air time to those who are __________ about the effects of media violence on violent beha
    9·1 answer
  • Direct Mapped Cache. Memory is byte addressable. Fill in the missing fields based upon the properties of a direct-mapped cache.
    6·1 answer
  • Joe, a user, wants his desktop RAID configured to allow the fastest speed and the most storage capacity. His desktop has three h
    12·1 answer
  • Create a jQuery ready listener that updates the options within the element with ID toCurrency such that: The first element is: S
    12·1 answer
  • Gemima wants to order the different kinds of food alphabetically on the table. Which actions should she take? Check all that app
    8·2 answers
  • Complete the below method, isPalindrome(), that takes in a String and returns a boolean. The boolean should be true if the Strin
    7·1 answer
  • Does anyone have a rbx account? If they do friend request Tribalchief777
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!