open a second spreadsheet
click on each cell
a common technique to clear a float within a container element is to add a line break (
) element configured with the clear property; if cleared with
it is coded before the closing
The <br> HTML element causes a line break in the text.
What are tags in HTML?HTML tags are used to keep the HTML element in place. The HTML element contains the content. HTML attributes are used to describe an HTML element's properties in detail. HTML tags begin with < and end with >. Whatever is written within an HTML tag is an HTML element.In HTML, four tags are required. These are the html tags, title, head, and body. The table below displays the opening and closing tags, as well as a description and an example. These are the tags that go at the start and end of an HTML file.If you want to start a new line, you must use the <br> to insert a line break. In the document, the tag inserts a single carriage return or breaks. This component has no end.To learn more about HTML tags refer to :
https://brainly.com/question/13153211
#SPJ4
Consider the following program code:
x = 9
y = 3
temp = x
x = y
y = temp
What are the values of x and y as a result of this program code?
The values of x and y as a result of this program code are x = 3 and y = 9
How to determine the values of x and y in the program codeFrom the question, we have the following parameters that can be used in our computation:
x = 9
y = 3
temp = x
x = y
y = temp
Next, we analyze the code segment one after the other
x = 9 ⇒ this means that the value of x is 9y = 3 ⇒ this means that the value of y is 3temp = x ⇒ this means that the of temp is x i.e. temp = 9x = y ⇒ this means that the of x is y i.e. x = 3y = temp ⇒ this means that the of y is temp i.e. y = 9Using the above as a guide, we have the following:
x = 3 and y = 9
Hence, the values are x = 3 and y = 9
Read more about code segments at
https://brainly.com/question/29104073
#SPJ1
A local variable is printed outside its function. What is the output?
A global version of the variable
Both local and global versions of the variable
The local variable
The output is not defined
In which of the following cases should an import statement not be used?
For a library module needed in a code
For a package with functions from the libraries
For code from Python libraries
For redefining a function called in a code
Select a circumstance when placing a comment inside your code is not justified.
When mentioning useful information that is not in the code
When referencing obscure logic to make sure others follow the code
When stating a simple fact in the code
When using block comments for a longer explanation of the code
For the program below, suppose shipping=200. What is the program output?
def main():
shipping = int(input("Please enter shipping distance."))
if shipping <= 200:
print("We can ship your package!")
else:
print("We are sorry, but we cannot ship your package.")
main()
200
Please enter shipping distance.
We are sorry, but we cannot ship your package.
We can ship your package!
Answer:
Output: We can ship your package
Explanation:
Since the 200 its greater than or equal to shipping.
1. What abstraction does an OS provide for the CPU?
2. What abstraction does an OS provide for the memory?
3. What abstraction does an OS provide for the disk space?
Abstraction refers to the process of removing elements of a code or program that are irrelevant or distract from more important elements.
What are the abstractions OS provides?By virtualizing the CPU, the operating system provides this abstraction. By running one process, then stopping it and starting another, and so on, the operating system can create the illusion of many virtual CPUs when there is only one physical CPU (or a few).A memory abstraction is a layer of abstraction between program execution and memory that provides a different "view" of a memory location depending on the execution context in which the memory access is performed.Many operating systems include a hardware abstraction layer, which eliminates the need to modify the OS kernel in order to run programs on computers with different hardware architectures. It is a device driver that allows programs to connect to hardware peripherals through a consistent interface.To learn more about abstraction refer to :
https://brainly.com/question/25964253
#SPJ1
In Design view, which button should be selected in order to add a combo box to form?
Controls
Tab Order
Property Sheet
Add Existing Fields
Answer:
controls
Explanation:
A combo box is a drop-down menu that lists multiple predefined choices. A viewer of the form can select only one of the choices.
the following code checks if the value in memory address x3025 is equal to 32, and if so, it prints a message to the screen. however, it has a bug.
LDI R1, ADDRESS ; R1 = value in address 0x3025
ADD R1, R1, #-32 ; so R1 = R1 - 32
BRnp FINISH ; branch if above result is either positive or negative.
Hence above line is logically not correct. We should check for zero by writing BRz FINISH i.e branch if zero.
So line 4 has a bug. It can be fixed by writing, BRz FINISH .
What is computer bug?
A bug is a coding error in a computer program in computer technology. (We define a program as including the microcode that is built into a microprocessor.) Debugging is the process of finding bugs before users do. Debugging begins after the code is written and progresses in stages as the code is combined with other programming units to form a software product, such as an operating system or an application.
Bugs are frequently found after a product has been released or during public beta testing. When this happens, users must either avoid using the faulty code or obtain a patch from the software developers.
To know more about Debugging, visit: https://brainly.com/question/28159811
#SPJ4
Create an abstract class 'Bank' with an abstract method 'getBalance'. $100, $150 and
$200 are deposited in banks A, B and C respectively. 'BankA', 'BankB' and 'BankC'
are subclasses of class 'Bank', each having a method named 'getBalance'. Call this
method by creating an object of each of the three classes.
Answer:
abstract class Bank
{
abstract public int getBalance();
}
class BankA extends Bank
{
public int getBalance()
{
return 100;
}
}
class BankB extends Bank
{
public int getBalance()
{
return 150;
}
}
class BankC extends Bank
{
public int getBalance()
{
return 200;
}
}
public class Main
{
public static void main(String[] args)
{
BankA bankA = new BankA();
BankB bankB = new BankB();
BankC bankC = new BankC();
System.out.println("Deposited Balance is = $" + bankA.getBalance());
System.out.println("Deposited Balance is = $" + bankB.getBalance());
System.out.println("Deposited Balance is = $" + bankC.getBalance());
}
}
Which command will you choise to convert a column of data into row
A command which you should choose to convert a column of data into row is: B. Edit >> Paste Special >> Transpose.
What is a spreadsheet?In Computer technology, a spreadsheet can be defined as a type of computer document which comprises cells that are arranged in a tabulated format with rows and columns.
Additionally, a spreadsheet is typically used in various field to do the following on a data:
FormatArrangeSortCalculateIn this scenario, the set of commands in ascending order that can be used by an end user for the conversion of a column of data into row include the following;
EditPaste Special TransposeRead more on spreadsheets here: brainly.com/question/2996234
#SPJ1
Complete Question:
Which command will you choose to convert a column of data into row?
A.Cut and Paste
B. Edit >> Paste Special >> Transpose
C.Both of above
D. None of above
A current is induced in a wire by moving the wire through a magnetic field. Which is one factor that affects the direction of the current?
the direction in which the wire moves
the thickness of the wire
the direction of the needle on an ammeter
the type of magnet
Answer:
the direction in which the wire moves
One factor that affects the direction of the current is the direction in which the wire moves. Thus, an option first is correct.
What is a magnetic field?The area of space known as the magnetic field is where an item experiences the magnetic force when it is near a magnetic substance.
Numerous variables affect the direction of electric current flow in a conductor wire carrying electricity. Current will flow in the direction of a particular wire whether it is moving in or out.
This implies that altering the current's direction likewise alters the magnetic field's direction. Both sides of the magnet will be repelled by the magnetic field by bending away from the wire because the magnetic field produced by the current of electricity in the wire alters directions around the wire.
Therefore, a factor that affects the direction of the current is the direction in which the wire moves. Hence, an option first is correct.
Learn more about the Magnetic field here:
brainly.com/question/2976218
#SPJ5
A requested task is subject to be reported when:
Requesting for a screenshot
When it is asking for 3 proofs
When it contain an expired offer
When it requested for an app to be tested
A requested task may be reported if the links take you to a different offer than what is described in the steps.
What is requested task?A Task Request is a formal document used by a manager to define how much extra work an assigned employee is expected to perform in addition to routinely scheduled tasks and jobs.A request is one that includes several tasks. Each task is a single type of object that is released to the request. Once the tasks are assigned to the request, it can be transported.When workers are chosen to perform a campaigning task, it is not acceptable to ask them to use their credit cards or reveal credit card information. Similarly, they should not be compelled to reveal personal information such as their social security number.To learn more about requested task refer to :
https://brainly.com/question/20052358
#SPJ1
a user is complaining about a clicking noise from inside her computer. you open up the case and find that the noise is coming from the hard drive. which of the following actions should you take to deal with this issue
An uneven case surface that causes fan blade and motor noise, dust buildup that needs to be cleaned.
The motion to read and write data from the disc should be fluid when the actuator is in operation. When this movement isn't as smooth, the actuator tries to reset itself frequently. This is what causes the well-known hard disk clicking sound. In most situations, this is the source of your hard disk noise.
A broken or faulty equipment, on the other hand, will make a succession of short, sharp sounds, or clicks. These sounds, known as a hard disk "click of death," usually signify a mechanical breakdown. A clicking hard disk can also result in data loss if left ignored.
A failing hard disk has developed from a clicking noise in your computer to a grinding noise. Furthermore, you are seeing more error warnings while running applications, and your computer periodically stops.
Learn more about hard disk here https://brainly.com/question/14867477
#SPJ4
Examine the experience of shopping online vs shopping in traditional environment. Imagine that you have decided to purchase a digital camera or any other item of your choice, first shop for the camera in traditional manner.
Describe how you would do so (eg: how would you gather the necessary information, you would need to choose the particular item, what stores you would visit, how long it would take, price etc)
Next, shop for the item on the web or via a mobile app.
Compare and contrast your experiences, what were the advantages and disadvantages of each.
What would prefer and why?
Answer:
Explanation:
If I had to buy, let’s say an iPad, I would visit the official store. First of all, I would take a closer look at the product, revising it carefully, if it feels right and if it meets my needs. Then I would ask for the price if they have a discount or any sale upcoming or payment plan. If everything meets my requirements I would buy the item. On the other hand, if there weren’t any official stores around the place I live in, I would visit three different department stores, preferably where they have the product of my interest displayed, also I would ask about the price and/or payment plan or discounts and availability. I must mention that cost is an important aspect to make a decision on where to buy the item. All of this process would take about 1 or 2 days at most.
Advantages
-You can see, feel, check the product to dissipate any doubts, there are people willing to answer any question and help to make a better choice.
Get the product at the same moment you are paying for it and if you want to you can use/wear it immediately.
Disadvantages
If they are out of stock of the item of your interest, there is a chance you will have to wait a long time for it, although it could happen the store won’t have the product available again.
The offers are not as wide as on the web sites.
Shopping on the web or via a mobile app
It is almost the same as shopping in a traditional manner, the greater differences are that there are more virtual places/shops online to compare prices and availability and sometimes they have great offers, because of the competition. Generally, the items are cheaper than a department store.
This process could take about a week, especially if you are waiting for a specific offer.
Advantages
There are lots of options, lots of different online stores, that increase the chances to get a good offer or an item with better characteristics at the same price; if you don’t find availability in one web you can find it in another in no time.
There is no need to leave your house or put on pause your busy schedule, as you will receive the item at your door.
Disadvantages
You can’t check the product given they only display a few pictures of it and a brief description, there is no one to answer your doubts about the item, basically, the decision relies on your research and recommendations of the product.
After making your purchase, you will have to wait a few days to receive your item at home or the workplace. Sometimes happens the store confuses your order sending a different product or other with different characteristics, resulting in having to return the item and wait days to get what you order in the first place.
Explanation:
Which did I prefer and why?
Considering the advances in technology, I prefer to shop online, there I can find what I'm looking for and of course, they have a great offers, too. Besides, with day to day occupations I barely have time to go to a department store, so is easier to access using a computer or an app on the smartphone.
The Find and Replace dialog box cannot find background color formatting in tables that was applied using __________ or formatting that is applied based on ____________
table style, conditional formatting
The Find and Replace dialog box cannot find background color formatting in tables that were applied using table style or formatting that is applied based on conditional formatting.
The Find and Replace a dialog box is a powerful tool for quickly searching and replacing multiple words or phrases in a document. However, it cannot find background color formatting that has been applied to tables using table style or formatting based on conditional formatting.
This is because the Find and Replace dialog box only searches for text and not formatting. To find and replace background color formatting applied to tables, you will need to use the Formatting pane, which allows you to search for all formatting, including the background color.
For more questions like Conditional formatting click the link below:
https://brainly.com/question/16014701
#SPJ4
What do you do to boost cybersecurity?
Determine whether the statement is true or false. If f has an absolute minimum value at C, then f'(c) = 0. True False
The statement on the absolute minimum value is False.
Absolute Minima and Maxima:
We occasionally encounter operations with hills and valleys. Hill and valley points in polynomial functions typically have many locations. We are aware that these places, which can be categorized as maxima or minima, are the function's crucial points. The valley points are referred to as minimas and the hill points as maxima. We must determine the locations of the function's global maxima and global minima, which are known as the minimum and maximum values, respectively, due to the fact that there are several maxima and minima.
Critical Points:
When the derivative of a function f(x), for example, reaches 0, those locations are said to be its crucial points. Both maxima and minima are possible for these places. The second derivative test determines if a crucial point is a minima or maximum. Since the derivative of the function might occur more than once, several minima or maxima are possible.
Extrema Value Theorem:
Under specific circumstances, the extrema value theorem ensures that a function has both a maximum and a minimum. Although this theorem just states that the extreme points will occur, it does not specify where they will be. The theorem asserts,
If a function f(x) is continuous on a closed interval [a, b], then f(x) has both at least one maximum and minimum value on [a, b].
To know more about minima and maxima visit:
https://brainly.com/question/29562544
#SPJ4
FILL IN THE BLANK acdording to erik erikson, during the _________ stage, adolescents are faced with deciding who they are, what they are all about, and where they are going in life.
During the identity against identity confusion stage, according to Erik Erikson, adolescents must decide who they are, what they stand for, and where they want to go in life.
What Eriksonian stage of identity formation do people believe adults go through?Stage 6: Closeness vs. Isolation We are driven to examine intimate relationships as young people because we want to build them. Young adulthood, which occurs between the ages of 18 and 40, is the sixth stage of Erikson's psychosocial development theory.
According to Erik Erikson, what is identity?Erikson defined identity as a sense of one's self as a person and as a contributor to society (Hoare, 2002).
To know more about adolescents visit :-
https://brainly.com/question/9506316
#SPJ4
What factors or characteristics do you think are necessary to succeed in the Metaverse from a business perspective?
From a business perspective, the factors or characteristics that are necessary to succeed in the Metaverse from a business perspective are to spot the needs of players within the metaverse, examine trends, and build businesses around those.
What is the Metaverse?The metaverse is a fictional incarnation of the Internet as a single, ubiquitous, and immersive virtual environment made possible by the usage of virtual reality and augmented reality headgear. A metaverse is a network of 3D virtual environments centered on social connection.
The metaverse is a computer industry concept of the next version of the internet: a single, shared, immersive, permanent, 3D virtual place where humans may experience life in ways they cannot in the physical world.
Given that the Metaverse is supposed to be a mirror of reality, it thus would make business sense for commercial needs within the metaverse to be catered for by virtual businesses within the same environment.
Learn more about Metaverse:
https://brainly.com/question/29340413
#SPJ1
If you could design a different type of virtual memory addressing system, mapping physical memory to virtual memory, what would that look like? Please explain what you would do differently and what you would keep the same as what is normally done.
In your responses to your peers, compare and contrast your answer to those of your peers.
Your Discussion should be a minimum of 200 words in length and not more than 500 words. Please include a word count. Provide references.
The physical memory will be divided into segments in a segmentation-based system, and each sector will be translated to a different area of the memory space.
How much memory can be addressed?The number of equipped in the CPU is just one of several variables that affect a device's memory capacity. 32-bit CPUs can only address memory with a size of up to 4 GB. A 64-bit computer has a limitless amount of memory. Memory capacity is also influenced by operating systems.
What kind of address is in memory?A memory address's data type is a reference, which is indicated by the type to which it points and an asterisk (*).
To know more about memory address visit:
https://brainly.com/question/22079432
#SPJ1
Identify a Web page with an active rollover image and where it is located and describe the image
The Web was initially just text, which was incredibly boring. Thankfully, it didn't take long for the option to include photographs (as well as other more intriguing sorts of material) inside web pages.
What does a website rollover image mean?Rollovers are graphic elements that improve the aesthetics of a website and convey navigational information. As an indication that the picture is a link and can take the visitor to another part of the website, the Rollover changes when the user's mouse moves over the image.
What does HTML rollover mean?When a user rolls their mouse pointer over a graphical picture, rollover is a JavaScript technique used by Web developers to create the desired effect. The term "rollover" can also refer to a button on a website that enables user and website interaction.
to know more about rollover here:
brainly.com/question/28902915
#SPJ1
according to research firm gartner, the majority of loss-causing security incidents involve the handiwork of international cyber-criminal gangs.
According to research firm Gartner, the majority of loss causing security incidents involve the handiwork of international cyber criminal gangs. (False)
What are cyber criminal?Cybercriminals are individuals or groups of people who use technology to carry out nefarious acts on digital networks or systems with the goal of stealing confidential business information or personal data and making money.
It is well known that cybercriminals use the deep web's cybercriminal underground markets to exchange harmful products and services, like hacking tools and data that has been stolen. It's well known that some goods or services are specialized in the underground markets operated by cybercriminals.
In many nations around the world, laws pertaining to cybercrime are still changing. The task of locating, apprehending, accusing, and establishing cybercrimes poses a constant challenge to law enforcement agencies.
Learn more about cybercriminals
https://brainly.com/question/23326398
#SPJ4
what is the maximum file size supported by a file system with 20 direct blocks, single, double, and triple indirection? The block size is 1024 bytes. Disk block numbers can be stored in 4 bytes.
Answer:
We have, block size = 512
number of block numbers in an indirection block
= block size / 4
= 128
number of blocks for file data in that file object
= 16 + 128 + 128^2 + 128^3
Maximum file size:
(direct + single indirect + double indirect + triple indirect) * (blocksize)
= (16 + 512/4 + (512/4)^2 + (512/4)^3) * (512)
= 68853964800 bytes, ~64 gigs
Explanation:
Answer:
64 gigs
Explanation:
Ur mum!
for 802.11 wireless networks, a wireless security toolkit should include the ability to sniff wireless traffic and scan wireless hosts.
For 802.11 wireless networks, a wireless security toolkit should include the ability to sniff wireless traffic and scan wireless hosts: True.
What is 802.11ac?In Computer networking, 802.11ac is one of the wireless network standards which was developed by the Institute of Electrical and Electronics Engineers (IEEE) to operate on a 5 GHz microwave bandwidth (frequency) and as a result, it is faster and can transmit over a long distance.
As a general rule and generally speaking, a wireless security toolkit for 802.11 wireless networks should include all of the following features;
An ability to sniff wireless trafficAn ability to scan wireless hostsAn ability to assess the level of privacy afforded on its network.An ability to assess confidentiality afforded on its network.Read more on wireless network here: brainly.com/question/18370953
#SPJ1
Complete Question:
For 802.11 wireless networks, a wireless security toolkit should include the ability to sniff wireless traffic and scan wireless hosts. True or False
it's bad when a firm's e-mail and password file is stolen; however the impact is minimized because user passwords set up for one system cannot be used on others.
It's false. Stolen the e-mail and password on firm has a big impact. E-mail can be operated on other systems, and all important data stored in e-mail can be known and misused. This term is known as cyber attack.
A cyber attack refers to an assault created by cybercriminals using one or more computers against a specific or non-specific computers or networks. A cyber attack can maliciously turn off computers, steal data, or use a breached computer as a launch point for other attacks. Cyber attack can make the company make a loss, because the important data that is stored in their system can be stolen and misused.
The complete question is shown below:
It's bad when a firm's e-mail and password file is stolen; however, the impact is minimized because user passwords set up for one system cannot be used on others. True or False.
Learn more about cyber attack, here https://brainly.com/question/22255103
#SPJ4
Employees at a video streaming website suspect that users on desktop computers spend more time on their website than users on mobile devices. They plan on taking a large random sample of users to see if their suspicions are correct. What type of study is this, and what is the explanatory variable?
This is an observational study where type of device is the explanatory variable.
What is explanatory variable?A specific class of independent variable is an explanatory variable. Frequently, both words are used in the same sentence. The two, however, differ in a subtle way. Any other variables have no bearing on an independent variable at all. It is an explanatory variable when a variable cannot be independently determined.
Consider the case where soda and fast food were the two factors you used to explain weight gain. In spite of what you might believe, soda consumption and fast food consumption aren't actually unrelated.
Because they tempt you to buy a soda along with your meal, fast food restaurants are to blame. A lot of fast food options, such as nachos or hot dogs, are frequently available if you stop somewhere to buy a soda.
Learn more about explanatory variable
https://brainly.com/question/1529707
#SPJ1
Create a class called Car that includes three instance variables a model (type
String), a year (type String), and a price (double). Provide a constructor that initializes the three
instance variables. Provide a set and a get method for each instance variable. If the price is not positive,
do not set its value. Write a test application named CarApplication that demonstrates class Car’s capabilities. Create two Car objects and display each object’s price. Then apply a 5% discount on the
price of the first car and a 7% discount on the price of the second. Display each Car’s price again.
Answer:
Here is an example of a class called Car that includes three instance variables: model (type String), year (type String), and price (double). The class includes a constructor that initializes the three instance variables, as well as set and get methods for each instance variable:
Car.java:
public class Car {
private String model;
private String year;
private double price;
// Constructor
public Car(String model, String year, double price) {
this.model = model;
this.year = year;
if (price > 0) {
this.price = price;
}
}
// Set methods
public void setModel(String model) {
this.model = model;
}
public void setYear(String year) {
this.year = year;
}
public void setPrice(double price) {
if (price > 0) {
this.price = price;
}
}
// Get methods
public String getModel() {
return model;
}
public String getYear() {
return year;
}
public double getPrice() {
return price;
}
}
Here is an example of a test application named CarApplication that demonstrates the capabilities of the Car class:
CarApplication.Java:
public class CarApplication {
public static void main(String[] args) {
Car car1 = new Car("Ford", "2020", 30000.0);
Car car2 = new Car("Toyota", "2019", 35000.0);
// Display the price of each car
System.out.println("Car 1: " + car1.getPrice());
System.out.println("Car 2: " + car2.getPrice());
// Apply a 5% discount on the price of car 1
car1.setPrice(car1.getPrice() * 0.95);
// Apply a 7% discount on the price of car 2
car2.setPrice(car2.getPrice() * 0.93);
// Display the price of each car again
System.out.println("Car 1: " + car1.getPrice());
System.out.println("Car 2: " + car2.getPrice());
}
}
Explanation:
When this code is run, it will output the following:
Car 1: 30000.0
Car 2: 35000.0
Car 1: 28500.0
Car 2: 32850.0
you are employed as a network administrator of vincent motors. an unreleased blueprint of a new car model of vincent motors has been leaked on the internet. you assume that an intruder must have succeeded in gaining access to your network in order to copy the blueprint. which of the following access control techniques will you use so that such an activity can be detected in the future?
Select one: O Accounting O SOD O Geofencing O Authentication
The access control techniques will you use so that such an activity can be detected in the future is Authentication.
Who is network administrator ?An organization's designated network administrator is tasked with maintaining computer infrastructures, with a focus on local area networks (LANs) and up to wide area networks (WANs). Organization-specific responsibilities may differ, but some of the important areas of attention include setting up new hardware, maintaining on-site servers, enforcing licence agreements, monitoring software-network interactions, and ensuring network integrity and resilience.The maintenance of the network infrastructure and computer hardware that support a company's data network is the responsibility of the network administrators. In smaller businesses, they often assist with the distribution of new software, the purchase of new hardware, the upkeep of disc images for new computer installations, the making sure that licences are acquired and kept current for any required software, and the upkeep of the network.To learn more about network administrator refer to:
https://brainly.com/question/4264949
#SPJ4
Which operating system is not proprietary and does not rely on cloud-based applications?
Question 2 options:
a. Windows
b. Chrome
c. macOS
d. Linux
[window title] remote desktop connection [content] an internal error has occurred. [^] hide details [ok] [expanded information] error code: 0x4 extended error code: 0x0 timestamp (utc): 11/28/22 03:21:28 pm press ctrl c to copy.
1)Allow remote connections. 2)Change Remote Desktop connection settings. 3)Allow the Windows Firewall to connect to RDP. 4)Leave and re-join a domain. 5)Restart the Remote Desktop Services service.
What is remote desktop service?The term "remote desktop" in computing refers to a software- or operating-system functionality that enables a desktop environment on a personal computer to be run remotely off of one system and shown on a different client device. The key element of Windows Server 2008 that permits communication with and access to virtual machines is known as the remote desktop service. Remote Desktop Services refers to a feature of Microsoft Windows Server that offers remote access to graphical desktops and Windows apps (RDS).
RD Gateway creates an encrypted link between remote users and Amazon Elastic Compute Cloud (Amazon EC2) instances running Microsoft Windows without the need for a virtual private network (VPN).
To know more about remote desktop service visit:
https://brainly.com/question/29479708
#SPJ1
Compare and contrast data versus information? (2%) List at least six benefits of ICT? (3%) Discuss on the five main generation of computer? (2%) WRITE short notes on the following computer coding me BCD B) EBCDIC C) ASCII-7 & 8 D) UNICO
Answer:B
Explanation:ITS B
python this project will also utilize a database to store all inventory items, financial data, and past orders. when the user closes the program, this information must be retained so that when they open the program later, the data remains.
Using the knowledge in computational language in python it is possible to write a code that utilize a database to store all inventory items, financial data, and past orders.
Writting the code:import sqlite3
def get_name(database_file, person_id):
query = "SELECT personal || ' ' || family FROM Person WHERE id='" + person_id + "';"
connection = sqlite3.connect(database_file)
cursor = connection.cursor()
cursor.execute(query)
results = cursor.fetchall()
cursor.close()
connection.close()
return results[0][0]
print("Full name for dyer:", get_name('survey.db', 'dyer'))
How to iterate over range Python?
To loop through a set of code a specified number of times, we can use the range() function, The range() function returns a sequence of numbers, starting from 0 by default, and increments by 1 (by default), and ends at a specified number.
See more about python at brainly.com/question/29594386
#SPJ1