The answer is true.
Let's say we are calculating the volume of a grain silo where the the width is a constant, but the height can be changed.
In our code we would calculate the volume using something like:
PI * (WIDTH / 2)^2 * height
The variables in all caps would be named constants. Using them makes the code more readable to other people than if we were to just use their values like:
3.14 * (145.75 / 2)^2 * height
Answer:
today I am going to be out for the job interview so if I will make it happen I am going to New Orleans this week to get the kids to work on the spot and I can get ready to go out to dinner and I can make a few more people
Answer:
Interpolation string.
Explanation:
The proces of adding the variable in middle the string.The interpolation Replace the value of the Variable when the string data is processed .In the Interpolation process the variable is permitted with string containing double quotes.In the interpolation string the interpreter check the entirely string that the variable in middle the string.
Following is the example of interpolation string in Php
$n1 = "RAM";
echo "hello $name"; // output
Output:
hello RAM
Answer:
Written in Python
for num in range(1,1001):
sum=0
for j in range(1,num+1):
if num%j==0:
sum = sum + j
if num == sum:
print(str(num)+" is a perfect number")
Explanation:
This line gets the range from 1 to 1000
for num in range(1,1001):
This line initializes sum to 0 for each number 1 to 1000
sum=0
This line gets the divisor for each number 1 to 1000
for j in range(1,num+1):
This following if condition line checks for divisor of each number
<em> if num%j==0:
</em>
<em> sum = sum + j
</em>
The following if condition checks for perfect number
if num == sum:
print(str(num)+" is a perfect number")
Answer:
Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.
On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.
This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.