Is it solar heat? ultraviolet heat? UV?
Answer:
def getChar():
while True:
in1 = input('Enter first char: ')
try:
if len(in1) != 1:
raise
else:
in2 = input('Enter second char: ')
if len(in2) != 1:
raise
else:
break
except:
print('Enter just one character')
return in1, in2
def chars2string(in1,in2):
print(in1*5 + in2*5)
def main():
ls = getChar()
in1 = ls[0]
in2 = ls[1]
chars2string(in1, in2)
if __name__ == '__main__':
main()
Explanation:
The programming language used is python 3.
The script first defines a function getChar and makes use of a while loop in combination with try and except blocks and IF statements, the code ensures that both inputs that are entered by the user after the prompt are 1 in length. i.e. Just one character. This function returns the two characters that were entered.
The second function that is defined is chars2string this function takes two arguments, It repeats each argument five times and returns a joined string.
Finally, the main function is defined and it calls the getChar function first, the values that are returned by this function is assigned to two variables, that is then passed on to the chars2string function. The main function is called and the Joined string is printed to the screen.
Answer:
false well if u know someone u can click it
Answer:
The option(B) is the correct answer .
Explanation:
In C++ the // (two slash marks ) indicating the beginning of a comment .The two slash marks ( // ) comment the single line in a program.To use two slash marks ( // ) comment we simply write // in which line we have to make comment.
following are the example of code in c++
#include<iostream.h> // header file
void main() // main method
{
cout<< " india"; // print india
}
here // indicating the beginning of a comment .
Answer:
The network management requirements before the srvice is provided are as follows:
NMS policies need to be followed that would define what all data's to be collected and in what way.So as to monitor and manage the network,regular network discovery should be made and scanning should be made in order to identify the network connected devices.End of life policy to be followed with track maintanance aggreements.Network Change and Configuration Management configuration changes are to be made.Interface statistics is to be followed and made.Spanning tree protocol changes,router redundancy protocol and broadcase storm detection protocols need to be implemented.