1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddik [55]
3 years ago
14

Demonstrate how to write each condition as an if-else in Java. If yes, then the computer should print “The answer is A,” “The an

swer is B,” or “The answer is C.” Otherwise, the computer should print “The answer is not here.”
Condition: variable choice is A, B, or C.


(You must actually give a answer to the question. If your answer is A B or C then im removing your answer and flagging it.
Computers and Technology
1 answer:
konstantin123 [22]3 years ago
4 0

\tt x=(float(input("Enter\;your\:answer")))

\tt if\:x=A:

\qquad\tt print("The\:answer\:is\:A")

\tt elif\::

\tt x=B;

\qquad\tt print("The\:answer\:is\:B")

\tt x=C;

\qquad\tt print("The\:answer\:is\:C")

\tt else\::

\qquad\tt print("The\:answer\:is\:not\:here")

You might be interested in
This function returns the length of a string:
Anna71 [15]

Answer:

The strlen() function calculates the length of a given string.The strlen() function is defined in string.h header file.

Explanation:

It doesn’t count null character ‘0’. Syntax: int strlen(const char *str); Parameter: str: It represents the string variable whose length we have to find. Return: This function returns the length of string passed.

4 0
2 years ago
What is one important feature of an AUP?
rusak2 [61]

Answer:

A clear outline of the consequences of violating the policy  is the correct answer to this question.

Explanation:

AUPs are used by schools and universities, corporations, businesses, internet and hosting service providers, and website owners. An acceptable use of policy in AUP helps in many ways:

  • Online platforms and applications require users to sign the policy before granting access to any information database, online shop, or other networks.
  • An acceptable use policy helps in reducing risk when it comes to online safety, decreased productivity, and damage to both the company and the users.
  • One of the main reasons why an acceptable use policy is important is to ensure the safety of users.
  • Use of policy is also known as fair use policy.It is set of rules applied by the owner of the network or website.
8 0
3 years ago
Assuming that all of the table and column names are spelled correctly, what's wrong with the INSERT statement that follows?
Whitepunk [10]

Answer:

C. The number of items in the column list doesn't match the number in the VALUES list.

Explanation:

The INSERT INTO statement is used to insert new records in a table.

<u>Syntax is as follows:</u>

INSERT INTO table_name (column1, column2, column3, ...)

VALUES (value1, value2, value3, ...);

Each column item has to match with the values to be inserted in the same order.

In the question, there are 8 column items specified whereas there are only 7 values given to be inserted.

3 0
3 years ago
HELP!!!<br> THIS HAPPENS EVERY TIME
Lelu [443]
Idek but hope u figure it out!
4 0
3 years ago
Read 2 more answers
A list is sorted by selecting the largest element in the list and swapping it with the last one. This technique is called ______
ratelena [41]
Selection sort is the answer
4 0
3 years ago
Other questions:
  • Waterpower was first harvested by ancient societies using
    5·1 answer
  • True or false over the course of ecological succession,species diversity increases over time?
    12·2 answers
  • why do networking components need more examination from an information security perspective than from a systems development pers
    5·1 answer
  • What happens it the offshore team members are not able to participate in the iteration demo due to time zone/infrastructure issu
    11·1 answer
  • If you tap or click the increase font size button too many times and make the font size too big, you can tap or click the _____
    9·1 answer
  • I only put one answer and didn’t specify what it answered
    14·2 answers
  • Explain the consequences of using bits to represent data.
    10·1 answer
  • What is the name of the first practical asymmetric cryptosystem that was created?
    15·1 answer
  • 2 what is deep learning?
    5·1 answer
  • 3. It is important to make certain that your employees are aware of the work ethic
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!