1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grin007 [14]
3 years ago
13

Can anybody do Algorithm 2 for me (with Python). Answer = 25 points.

Computers and Technology
1 answer:
Nostrana [21]3 years ago
5 0

Answer:

age=int(input("Enter age"))

if age>=18:

    print("You are Young")

else

   print("You are child")

Explanation:

if you have any query or any problem kindly ask in comment

You might be interested in
Which of the following is NOT an example of input?
geniusboy [140]

Answer:

a pop-up box

Explanation:

A voice command, mouse clicks, or keyboard strokes is the <em>user</em> doing something. But a pop-up box is not. I realize that a popup box could <em>contain</em> a user input, but the box itself is not any sort of user input. It's the opposite.

4 0
3 years ago
What color is the smartart tolls tab?
garri49 [273]

Answer:

yellow

Explanation:

SmartArt tab is part of Microsoft Office. This tab is available in the Illustrations group, which is inside the insert tab. SmartArt tab is used to provide a new type of graphical tools that includes a list, process, cycles, etc.  

The advantages of the SmartArt tab is  given below:

  • The SmartArt tab normally provides a way to make an organized presentation.
  • This tab is mainly used on word, excel, and PowerPoint.

3 0
3 years ago
Discuss, in detail, the usefulness of graphics and images in program development. Explain the importance of the interface of a c
vesna_86 [32]

Answer:

Explanation:

The main importance of graphics and images in program development is user experience. These graphics, color schemes, clarity, images etc. all come together to create a user interface that individuals will be able to easily navigate and use with extreme ease in order to benefit from what the program is intended to do. An interface of a class of objects allows every button and object in the program to grab and share functionality in order for the entire program to run smoothly.

4 0
3 years ago
You are configuring a firewall to use NAT. In the configuration, you map a private IP address directly to a persistent public IP
Ivan

Answer:

Option B (Static NAT) would be the correct choice.

Explanation:

  • Static NAT seems to be a method of NAT methodology used to navigate as well as monitor internet usage from some kind of specific public IP address to something like a private IP address.
  • Everything always allows the provision of web access to technology, repositories including network equipment inside a protected LAN with an unauthorized IP address.

Some other decisions made aren't relevant to the situation in question. So the above alternative is indeed the right one.

8 0
3 years ago
Using a "word" of 5 bits, list all of the possible signed binary numbers and their decimal equivalents that are represent able i
Vsevolod [243]

Answer:

i). Signed magnitude

Five bit representation = 11111

For positive 5 bit representation = 01111 = +15

For negative 5 bit representation = 11111 = -15

ii). One's complement

For positive 5 bit representation = 01111 =+15

For negative 5 bit representation = 10000 = -15

iii). Two's compliment

For positive 5 bit representation = 01111 = -15

For negative 5 bit representation = 10001 = +15

7 0
3 years ago
Other questions:
  • WILL MARK BRAINLYIST
    15·2 answers
  • Compare and contrast how the roles of women and men in society are changing​
    14·1 answer
  • When a user inserts a PivotTable, where will it be inserted?
    15·1 answer
  • What are the consequences of plagiarism?
    7·2 answers
  • Which of the following is not a hazard a driver might encounter?
    5·1 answer
  • The most useful index fossils are of organisms that are still alive today.
    11·2 answers
  • -(-13) P binary using signed. 2's complement representation
    11·1 answer
  • Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a p
    14·1 answer
  • Which of the following is not considered essential for an electronic device to be called a computer?
    15·1 answer
  • The ______ process retains copies of data over extended periods of time in order to meet legal and operational requirements.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!