1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tom [10]
3 years ago
15

Hi there! I just started my beginner computer science class and I was wondering if anyone wants to help with an assignment i'm h

aving trouble with.
Here are the instructions:

Write a program that contains 3 variables and produces the logic table. You will need to request input from the user to set the variables in the form of T or F for each variable. Try to condense your program so you write a single conditional to produce the table. Place the following at the beginning of your code, with all of your code indented to be in that block, so you have a continuous loop:

while True:


I attatched the logic gate to this question.

Thank you!

Computers and Technology
1 answer:
Alik [6]3 years ago
5 0

After looking at your question, I reasoned you were writing this in python. Here's my code, I hope it helps!

while True:

   v1 = input("Enter value of first variable (T/F) ")

   v2 = input("Enter value of second variable (T/F) ")

   v3 = input("Enter value of third variable (T/F) ")

   print("v1: {}, v2: {}, v3: {} = T".format(v1, v2, v3) if v1 == "T" and v2 == "T" or v1 == "T" and v3 == "T" else "v1: {}, v2: {}, v3: {} = F".format(v1, v2, v3))

You might be interested in
What are the planes used to allow SDN to virtualize parts of the physical network so that it can be more quickly and easily reco
deff fn [24]

Answer:

Data Plan and Control Plan is the correct answer to the following question.

Explanation:

The following answer is correct because The SDN(Software Defined Networking) are allow to use the data plan and the control plan to virtualize the parts of the physical networks that's why it configured more quickly and easily. It also helps the users to give access of the network programmability. Two is done by this network firstly, this network deliver the data and secondly, it also manages the data.

3 0
3 years ago
Which type of attack modifies the fields that contain the different characteristics of the data that is being transmitted?
tatuchka [14]

Answer:

An HTTP Header attack

Explanation:

In web applications an HTTP refers to Hypertext Transfer Protocol and an HTTP Header is the value that is displayed in  a request or response message, the header has a name and a value separated by a colon.

An HTTP header attack called an header injection is a vulnerability that is present when users' inputs are required for the dynamic generation of HTTP headers. This vulneraility allows several security threats to be carried out, some examples are:

  1. Malicious site redirection
  2. Cross-site scripting, and
  3. Session fixation through the set-cookie header
8 0
3 years ago
Complete the steps for adding a recurring event.
daser333 [38]

Answer:

which type of questions is this

7 0
2 years ago
Tomahawk Industries develops weapons control systems for the military. The company designed a system that requires two different
mojhsa [17]

Answer:

<em>D. Separation of duties</em>

Explanation:

Separation of duties (SoD) is a fundamental concept in internal controls and is the hardest and often the most expensive to achieve.

<em>This aim is accomplished by distributing the tasks and associated permissions among multiple people for a specific security system.</em>

7 0
3 years ago
A case competitions database:You work for a firm that has decided to sponsor case competitions between teams of college business
Strike441 [17]

Answer:

We will ned (4) four tables.

Explanation:

For the given scenario we will have to build a relational database. The database will have four tables i.e. Competation, Collage, Team and student.

For each table the database fields are mention below. Note that foreign keys are mentioned in itallic.

Competition:

Competition_ID, Competition_Name, Competition_Data, Competition_Name _of_Branch, <em>College_ID</em>

<em />

Collage:

Collage_ID, Collage_Name, Collage_Contact, Collage_address

Team:

Name, Color, <em>Team_ID, College_ID, Competition_ID</em>

<em />

College:

Student_ID, First_Name, Last_Name, Date_of_Birth, Major, Expected_Gradiuation_Date, <em>Collage_ID, Team_ID, Competation_ID</em>

3 0
3 years ago
Other questions:
  • To use files in a c++ program you must include the ________ header file.
    15·1 answer
  • Draw the cache tables and the state of all bits within them. Suppose you have a 16 byte cache with 2 byte long cachelines that i
    6·1 answer
  • "The ____________________ function is a logical function that returns a TRUE value if any of the logical conditions are true and
    14·1 answer
  • which statement draws an accurate comparison between social media marketing and conventional marketing?
    13·1 answer
  • How we know that how many domain exist in window server 2012?
    14·1 answer
  • When your friend DaJuan turns on his computer, he hears four beeps. The computer won’t fully boot. DaJuan has a Dell computer wi
    7·1 answer
  • Compute their Cartesian product, AxB of two lists. Each list has no more than 10 numbers.
    5·1 answer
  • I CANT DO SKIN MODS ON BRAWLHALLA RIGHT!!!! IM SO MADDDDDDDDDDD
    11·1 answer
  • The Uniform Electronic Transmission Act (UETA) a. declares that e-signatures are invalid. b. has only been adopted in a handful
    8·1 answer
  • Jerry purchased 25 dozens of eggs. He used 6 eggs to bake 1 cake. How
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!