1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hodyreva [135]
3 years ago
8

False

Computers and Technology
1 answer:
Anarel [89]3 years ago
4 0

Answer:

Explanation:

2. #The correct finished code would be the following.

def greeting(name):

  if name == 'Taylor':

      return "Welcome back Taylor!"

  else:

      return "Hello there, " + name

print(greeting("Taylor"))

print(greeting("John"))

3.  The output of this code will be 2 , this is because the second elif statement states that if the number is greater than 20 or less than 12 to print out the value 2. Since the input number is 10 then that is the elif that will be called.

You might be interested in
Types of cybercrime​
sergij07 [2.7K]

Answer:

Types of cybercrime

Here are some specific examples of the different types of cybercrime:

*Email and internet fraud.

*Identity fraud (where personal information is stolen and used).

*Theft of financial or card payment data.

*Theft and sale of corporate data.

*Cyberextortion (demanding money to prevent a threatened attack).

*Ransomware attacks (a type of cyberextortion).

*Cryptojacking (where hackers mine cryptocurrency using resources they do not own).

*Cyberespionage (where hackers access government or company data).

Most cybercrime falls under two main categories:

*Criminal activity that targets

*Criminal activity that uses computers to commit other crimes.

Explanation:

8 0
3 years ago
Read 2 more answers
Driving is expensive. Write a program with a car's miles/gallon and gas dollars/gallon (both floats) as input, and output the ga
Ierofanga [76]

Answer:

x^{2} \left[\begin{array}{ccc}1&2&3\\4&5&6\\7&8&9\end{array}\right] \int\limits^a_b {x} \, dx  \lim_{n \to \infty} a_n \sqrt{x} \sqrt[n]{x} \pi \alpha \frac{x}{y} x_{123} \beta

Explanation:

6 0
3 years ago
Read 2 more answers
What is the full meaning of the following word,1. HTTP,2. CPU,3. WYSIWYG and 4. PC​
lisabon 2012 [21]

Answer:

I know answer of 2 and 4

2. Central procesding unit

4. Personal computer

5 0
3 years ago
Read 2 more answers
#include "pch.h" #include using namespace std; // function prototypes void bubbleSort Array(int[], int); void displayArray(int[]
lisov135 [29]

Answer:

what are you asking

Explanation:

7 0
3 years ago
Write SQL statements for the following: 1. 2. 3. Change the column Z of a table XYZ to now acceptdefault value 9999 Delete a tab
Ad libitum [116K]

Answer:

1.In the first query the column Z of table xyz wil change and set to its  default value so we use alter command .

Syntax :ALTER TABLE TABLENAME  ALTER COLUMN NAME  SET DEFAULT VALUE

So SQL query is :

ALTER TABLE  XYZ  ALTER Z SET DEFAULT  9999  ;

This query will Change the column Z of a table XYZ to acceptdefault value 9999 .

2.In the second query we delete a table from database so we use DROP    command .

Syntax :DROP TABLE TABLENAME;

So SQL query is :DROP TABLE XYZ;

This query will delete the table from database.

3.In the last query we have to change the column Z from table again we      use alter command .

Syntax:ALTER TABLE TABLENAME  DROP  COLUMN  COLUMNNAME  ;

So SQL query is :

ALTER TABLE XYZ DROP COLUMN Z;

This query will delete column Z from the table XYZ.

8 0
3 years ago
Other questions:
  • Gross Domestic Product is equivalent to which of the following?
    13·1 answer
  • What is a geotag?
    10·1 answer
  • A/an ________is a device used to protect computers against surges and spikes in power.
    14·1 answer
  • I want to know why almost every single "expert answer verified" thing I come across is wrong. If it's wrong, why the h is it exp
    8·2 answers
  • Windows _ is a built-in tool that uses libraries, or groups of related files, to enable you to search for programs, files, or fo
    13·1 answer
  • Write the name of the tab, command group, and icon that is used to create multilevel lists.
    12·1 answer
  • Ronaldo wants to determine if employees would prefer having bagels or
    15·1 answer
  • Help...! Why might you trace an image<br> A. To edit an image<br> B. To make drawing easier
    14·1 answer
  • What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
    13·2 answers
  • Identify the correctly constructed ALTER TABLE statement to add a UNIQUE constraint to the column customer_number with the const
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!