1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxandr [17]
3 years ago
8

Create a variable ‘temp’ and assign the value in Celsius. Display the message ‘It’s extremely hot day today!’ if the temperature

is greater than 40 degree C otherwise, displays ‘It’s not too hot!
Computers and Technology
1 answer:
Svetlanka [38]3 years ago
8 0

Answer:

temp = 47

if temp > 40:

   print("It’s extremely hot day today!")

else:

   print("It’s not too hot!")

Explanation:

*The code is in Python.

Create a variable called temp and set its value as 47

Check the temp using if-else structure. If the temp is greater than 40, print "It’s extremely hot day today!". Otherwise, print "It’s not too hot!".

You might be interested in
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
cestrela7 [59]

Answer: Stealth scanning technique

Explanation:

Stealth scanning technique consist of the following types of scans :

1. FIN scan

2. X- MAS tree scan

3. NULL scan

The FIN scan responds by considering port open if response in received for its packet sent with the fin flag else considered closed.

The X-MAS tree scan fires up by setting a  TCP packet with URG, PUSH, FIN flags and the port is considered open if no response.

NULL scans sends null packet and considers it to be an open port.

Stealth scanning techniques considers to get some response from the network with out actually using a handshaking and is used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic.

3 0
4 years ago
What represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually d
alexandr402 [8]

Answer:

Attenuation is the one-word answer which is the correct answer for the above question.  

Explanation:

Attenuation is a concept which told about the barrier, which is used to stop the signals in the connected network systems. Attenuation can be a form of any type of barrier like weak signals, or because of long-distance.

Following are the example which is in the form of attenuation--

  1. Noise
  2. The distance can also be a problem for weak signals.
  3. Hacker also disestablished the network signals.
  4. The physical objects.

Hence the attenuation can be formed by any of the barriers of signals, like physical obstruction, longer distance, and radio inference.

7 0
3 years ago
What are the major features of React?
marysya [2.9K]

<em>JSX - JavaScript Syntax Extension. JSX is a syntax extension to JavaScript. </em>

<em>Virtual DOM. React keeps a lightweight representation of the “real” DOM in the memory, and that is known as the “virtual” DOM (VDOM)</em>

<em>Performance. ...</em>

<em>Extensions. ...</em>

<em>One-way Data Binding. ...</em>

<em>Debugging. ..</em><em>.</em>

<em>Components. ...</em>

<em>State.</em>

3 0
3 years ago
From MCYT who was the the one who said "SUCK IT GREEN BOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOY"
Papessa [141]

Answer:

Tommyinnit

Explanation:

8 1
3 years ago
Read 3 more answers
See the file attached!​
Dimas [21]
  1. Mail Merge is a handy feature that incorporates data from both Microsoft Word and Microsoft Excel and allows you to create multiple documents at once, such as letters, saving you the time and effort of retyping the same letter over and over.
  2. The Mail Merge feature makes it easy to send the same letter to a large number of people.
  3. By using Mail Merge, we don't have to type each recipient's name separately in each letter.
  4. We need to proofread only the main document network database systems object- oriented database system Hierarchical database system.
6 0
2 years ago
Other questions:
  • A friend has a CD of one of your favorite artists and has offered to let you copy it.
    8·1 answer
  • Which of the following is the best example of potential energy?
    9·2 answers
  • Which statement about information published on the internet is true?
    9·2 answers
  • Create a "web page" with the following components: An input field for the "number of rounds to play" The "number of remaining" r
    14·1 answer
  • PLEASE HURRY
    6·1 answer
  • When a programmer creates an abstract data type, he or she can decide what values are acceptable for the data type, as well as w
    12·1 answer
  • Consider the following arrays. 1 4 21 2 4 100 B # 111(A) L3π 42 Write MATLAB expressions to do the tollowing a. Select just the
    13·1 answer
  • 1. The component that displays output
    5·1 answer
  • Write a C++ program that produces a simple personalized adventure game called Lost Fortune about a band of explorers that finds
    12·1 answer
  • How many times will it tack when you fill 1 - liter of jar with water from the pond and uses 100 - milliliter cup to scoop water
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!