1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kitty [74]
2 years ago
14

Difference between if then and if then else statement ​

Computers and Technology
1 answer:
Troyanec [42]2 years ago
6 0

Answer:

<em>if..then statement is used to make a decision when there is only two options. </em>

<em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em> </em><em>&</em>

<em>you have to write a program that have to choose from three options then we use if..then..else statement.</em>

<h3>I HOPE THIS WILL HELP YOU IF NOT THEN SORRY</h3>

HAVE A GREAT DAY :)

You might be interested in
It is okay to use a dust rag when cleaning the inside of a computer.
Sunny_sXe [5.5K]
Yes you can do that, it won't hurt the computer.
4 0
2 years ago
Read 2 more answers
How did transistors revolutionize the world of computers?
Marizza181 [45]

Answer:

Transistors transformed the world of electronics and had a huge impact on computer design. Transistors made of semiconductors replaced tubes in the construction of computers. By replacing bulky and unreliable vacuum tubes with transistors, computers could now perform the same functions, using less power and space.

3 0
3 years ago
you have been using snmp on your network for monitoring and management. you are concerned about the security of this configurati
Zinaida [17]

The thing that should be done is to implement version 3 of SNMP.

<h3>How to depict the information?</h3>

In this situation, the person has been using snmp on your network for monitoring and management. you are concerned about the security of this configuration.

Therefore, since the person is concerned about the security of this configuration, the thing that should be done is to implement version 3 of SNMP.

Learn more about configuration on:

brainly.com/question/26084288

#SPJ12

6 0
1 year ago
a customer receives a message from the bank asking him/her to provide login information. assuming the message is intended to def
gizmo_the_mogwai [7]

The type of infiltration technique used here is phishing. Phishing is a form of social engineering attack that is often used to obtain user information such as login and credit card information.

Phishing is a type of social engineering in which an attacker delivers a false (e.g. fake, fake, or other deceptive) communication designed to trick a person into providing critical information to the attacker, or to install malicious software, such as ransomware, on the victim. infrastructure.

Phishing attacks are becoming more sophisticated and often transparently mirror the website being attacked, allowing the attacker to track everything the victim is doing there and bypass other security barriers with them.

By far the most common attack by hackers as of 2020, according to the FBI Internet Crime Complaint Center, which records more phishing incidents than any other type of cybercrime combined.

To know more about phishing click here:

brainly.com/question/24156548

#SPJ4

7 0
11 months ago
You decide to buy some stocks for a certain price and then sell them at another price. Write a program that determines whether o
ser-zykov [4K]

Answer:

#here is code in python.

#read number of shares

num_share = int(input("Enter number of shares:"))

#read purchase price

buy_p = float(input("Enter purchase price:"))

#read sell price

sell_p = float(input("Enter sale price:"))

#total buying cost

buy_cost=buy_p*1.03*num_share

#total selling cost

sell_cost=sell_p*0.97*num_share

#if net profit

if(sell_cost>buy_cost):

   print("After the transaction, you made " +str(sell_cost-buy_cost)+ " dollars.")

#if net loss

else:

   print("After the transaction, you lost " +str(buy_cost-sell_cost)+ " dollars.")

Explanation:

Read the total number of shares from user.Then read buying price of a share and selling price of a share.Then calculate total buying cost including commission.Calculate total selling cost excluding the commission.If total buying cost is greater than total selling cost the print the profit else print the loss in the transaction.

Output:

Enter number of shares:10

Enter purchase price:10

Enter sale price:10

After the transaction, you lost 6.0 dollars.

4 0
3 years ago
Other questions:
  • You have been contracted by a local school to evaluate their computer labs for security threats. They are most worried about the
    6·1 answer
  • A user reports his or her computer is slow to boot. You check the boot order and determine that the computer is checking the C d
    12·1 answer
  • A _____ is a climate-controlled building or set of buildings that houses database servers and the systems that deliver mission-c
    6·1 answer
  • True or false.the color attribute cannot recognized the hexadecimal code.
    7·2 answers
  • What’s the most popular operating system
    9·2 answers
  • Stephanie would like to know the average number of regular hours worked by her employees. In cell B11, create a formula using th
    8·1 answer
  • A(n) ___________________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of th
    10·1 answer
  • Retail products are identified by their Universal Product Codes (UPCs). The most commonform of a UPC has 12 decimal digits: The
    8·1 answer
  • How to do or create a shepard tone using additive synthesis in Pure Data. Please help, desperate!!
    8·1 answer
  • What is the output for the following program?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!