1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena55 [62]
3 years ago
15

Write programs in python to display “Valid Voter”. (condition : age of person should be

Computers and Technology
1 answer:
muminat3 years ago
4 0

Answer:

X = int(input("Age = ")

if (X >= 18):

print('Valid Voter')

Else:

return 0

Try it and let me know. :)

You might be interested in
Consider the following code snippet. Is count < 5 always true, always false, or sometimes true/sometimes false at point 2?
AleksAgata [21]

Answer:

c. count 5 is sometimes true/ sometimes false at point 2

Explanation:

The while-loop statement is a conditional looping statement in programming that executes a block of code if a condition is met.

In the program, the value of the count variable is first initialized to zero but the while-loop would continuously increment the count variable by one if the count variable is less than five, which means that the while-loop stops and the code block is not executed at count equal to five.

8 0
3 years ago
What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap
NNADVOKAT [17]

The two devices in a computer that should be considered "black boxes," and should never be opened due to risks involving charged capacitors are MONITOR and POWER SUPPLY.

Explanation:

  • Physical contact or close proximity to the open power supply caused a discharge from the capacitor that resulted in an electric shock. Capacitors can discharge current even when not energized because they hold a charge for some time after the power is turned off.
  • To do harm to your body, the voltage across the capacitor's terminals must be high enough to cause a harmful effect on you. There are no hard rules for at what voltage things become harmful, but a common 'rule of thumb' is that DC up to 48 Volt is considered low voltage. So a capacitor charged to a voltage below 48 V is fairly safe.
  • A charged capacitor can be very dangerous, so it's important that you avoid coming into contact with the terminals at all times.
3 0
3 years ago
What can be used to store data, plant viruses, or steal data?
SCORPION-xisa [38]

Answer:

<u>ITS A SIMPLE ANSWER BUT THE PROBLEM IS TOO BIG!</u>

Explanation:

The phishing email might contain a link which on clicking will take you to a fake web page. For example, the link might take you to a fake bank website which looks very legitimate but in reality is just a lookalike. If the victim falls for the scam and enters his/her account details on the website, the details will actually go to the hacker's server instead of going to the bank and the hacker will have all the information that the victim has provided on the website.

4 0
3 years ago
By 1955, half of all U.S. households ________ had access to the internet. had satellite radio in at least one car. owned at leas
storchak [24]

Answer:

Owned at least one television.

Explanation:

Part among most of the U.S. families with at least 1 TV had internet connection in the year 1955.

Average American invests between two and a part to nearly several times in a day enjoying tv, based on the study as well as the period of the year. This was never only critical that such a period should be expended on tv however that it remains not wasted on other things, including studying or hanging out or making friends.

8 0
4 years ago
Discuss some designs using columns, gutters, text alignment, graphics, etc.
Naily [24]

Answer:

.......

Explanation:

8 0
3 years ago
Other questions:
  • What does confidentiality of data refer to?
    6·2 answers
  • Elaine works in a production house, and she determines the visual aspects of films and television. what is her profession?
    8·1 answer
  • A network on the internet has a subnet mask of 255.255.240.0. what is the maximum number of hosts it can handle
    5·1 answer
  • Helping people keep track on things is the purpose of_____ A database B table C query D form​
    12·1 answer
  • Write a summary, on the requirements for a home automation IoT network discussing whether Wi-Fi is the best network option, by c
    13·1 answer
  • What is better apple or andriod
    11·2 answers
  • Electronic cover letters are longer than traditional paper cover letters.
    13·2 answers
  • Write a program to compute the sum of digits in a number given by the user. You must use your own function to compute the sum of
    6·1 answer
  • This might sound crazy! But please help.
    10·1 answer
  • You find information that you know to be classified on the internet. What should you do.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!