Retype the below code. Fix the indentation as necessary to make the program work.

if 'New York' in temperatures:

if temperatures['New York'] > 90:

print('The city is melting!')

else:

print('The temperature in New York is', temperatures['New York'])

else:

print('The temperature in New York is unknown.')

Sample output with input: 105


The city is melting!

Perferred in Python

Answers

Answer 1

The retyped code fixing the indentation problem is attached below

Proper Indentation in python

The proper indentation of lines of codes in python can be done by hitting the the space 4 times or by using the Tab button

The values assigned to the dictionary with variable_name temperatures is missing but I have provided an assumed dictionary to enable the proper writing and Indentation of the lines of code.

Hence we can conclude that The retyped code fixing the indentation problem is attached below.

Learn more about errors of proper indentation : https://brainly.com/question/18497347

#SPJ1

Retype The Below Code. Fix The Indentation As Necessary To Make The Program Work. If 'New York' In Temperatures:

Related Questions

Edit the following statement so it uses the constant named YEAR:

newAge = currentAge + (2050 − currentYear);

Answers

Using the knowledge in computational language in C++ it is possible to write a code that will calculate the age of someone through the difference of years.

Writing code in C++ has:

#include <iostream>

using namespace std;

int main()

{

//Declare variables

int myCurrentAge=29;

int myNewAge;

const int YEAR = 2050; //Declare constant YEAR=2050

int currentYear=2014;

myNewAge=myCurrentAge+(YEAR-currentYear); //calculate new age

cout<<"My Current Age is "<<myCurrentAge<<endl;

cout<<"I will be "<<myNewAge<<" in "<<YEAR<<"."<<endl; //display values on console

return 0;

}

See more about C++ at brainly.com/question/19705654

#SPJ1

Identify the correctly constructed ALTER TABLE statement to add a UNIQUE constraint to the column customer_number with the constraint name customer_number_unique on the table called 'customer'.

Answers

ALTER TABLE customer ADD CONSTRAINT customer_number_unique UNIQUE (customer_number);

Use the following sentence, for instance, to add a unique constraint to the customer table's fname and lname columns: Change the customer table to add a unique constraint (lname, fname);

What ALTER TABLE statement to add a UNIQUE constraint?

When using an ALTER TABLE query in SQL Server, the following syntax is used to create a unique constraint: (Column 1, Column 2,…, Column n) ALTER TABLE name ADD CONSTRAINT constraint name UNIQUE; table name

Each value in a column is guaranteed to be unique by the UNIQUE constraint.A column or collection of columns' uniqueness is ensured by the UNIQUE and PRIMARY KEY requirements. A UNIQUE constraint comes with a PRIMARY KEY constraint by default.

Therefore, ALTER TABLE customer ADD CONSTRAINT customer_number_unique (customer_number);

Learn more about unique constraint here:

https://brainly.com/question/8986046

#SPJ2

While conducting routine maintenance, you discover a network server that needs to
be replaced fairly soon. The server must be shut down during the replacement, which
will affect office operations. The office manager asks for an update.
What should you say?

Answers

Answer:

tell the truth and make other people aware of what is going on inorder for them to also be hands on deck and come up with solutions to also help solve the problem

5 reasons why application programs are temporarily stored in main memory

Answers

The reasons why application programs are temporarily stored in main memory are:

So that they CPU can have access to it easily. Because the main memory is one that is byte-addressable and it is one that CPU can use.

Why does operating system application software kept in the memory of the computer?

RAM (Random Access Memory) and other application programs are said to be kept  there because:

So that one can easily have access to it.So it can quickly transmit  or to reached by the device's processor. RAM is said to be main memory in a computer.

Therefore, The reasons why application programs are temporarily stored in main memory are:

So that they CPU can have access to it easily. Because the main memory is one that is byte-addressable and it is one that CPU can use.

Learn more about application programs from

https://brainly.com/question/1538272

#SPJ1

functions can also be called

Answers

Answer:

Explanation:

procedure or subroutine

or in maths, functions are called maps or mappings.

Answer:

it can be called function key which do functional works in computer

Identify suitable hardware components that will meet your requirements. Be reasonably specific. For example:

. a good processor such as an Intel i5 or i7 (or equivalent)
.enough RAM for amateur audio or video editing, approximately 16 or 32 GB or more if budget allows
.etc

Answers

A  suitable hardware components that will meet the requirements given below is  HP ENVY 17t laptop.

What is the specification about?

HP ENVY x360 15t laptop is known to be one that has a 3-sided micro-edge FHD display and its specification includes:

NVIDIA GeForce MX250 graphics cards About 1TB SSD space16GB RAMCost about $ 600-1500 dollars.

Therefore, A  suitable hardware components that will meet the requirements given below is  HP ENVY 17t laptop.

Learn more about hardware from

https://brainly.com/question/24231393

#SPJ1


What is application software used for?

A. To make certain tasks easier for the computer user
B. To help computer users fill out employment applications
C. To help computer users apply their knowledge in new ways
D. To make certain tasks more challenging for the computer user

Answers

Answer: c

Explanation:

You need to design an online login form in which users have to type their name and password to log into an application. The password can be a combination of numbers and letters. Which data type is most suitable for a password field?
The

data type is most suitable to define a password field.

Answers

The string data type is most suited for password fields.

What is the string data type?

A string data type is often used in programming to specify that a field can contain any sequence of characters such as a combination of numbers and letters which may be repeated. A typical string data type could also contain a maximum limit of characters.

You can learn more from a similar question about string data types here https://brainly.com/question/5871492

#SPJ1

Describe how PDF provides output that is consistent across different types of devices, including printers and monitors of various resolutions.
Describe the format for storing, laying out, and managing the objects on a page. Explain the advantages to the use of this format over other formats, such as that used by HTML.
Explain how PDF manages the many different type fonts that might be found in a document.
How does PDF manage bitmap images? Object images?
Explain how PDF differs from PostScript.
Describe at least three major limitations that PDF places on the end user of a PDF document.

Answers

The way PDF provides output that is consistent in all format is that when a given document is saved in a pdf format it is one that cannot be changed unless it is converted to the format that you want it to be, making it consistent with others.

What is output intent in PDF?

An output intent is known to be the last destination device a person need to use to reproduce the color in the PDF, e.g.  the use of separations printing device.

Note that, The way PDF provides output that is consistent in all format is that when a given document is saved in a pdf format it is one that cannot be changed unless it is converted to the format that you want it to be, making it consistent with others.

Learn more about PDF from

https://brainly.com/question/14703121

#SPJ1

Given a list of numbers, find the correct function to find the sum of the squares of only the positive elements.


sqsum1
sqsum2
sqsum3
sqsum4
sqsum5

Answers

Answer:

sqsum4

Explanation:

So to raise a number to a power in python, you can use the ** operation, which is usually confused with the ^, which is an operation, but it is not for raising numbers to a power. It is the xor bit operation, which if you don't know at the moment, it's fine, since it's not necessary for this. each of these lists uses a generation comprehension which is generally defined as: (x for x in object if condition) with the if condition being optional, but in this case it's necessary. If it's a bit confusing, you can define a generator using a function so it's a bit more spread out:

def generator(object):

   for x in object:

       if condition:

           yield x

Although in this instance were going to be performing some operation on x, which in this case is squaring it. So let's just look at the two functions that use the **, since they should be the only options that will be correct.

sqsum1(nums):

   This function does square x, except it uses incorrect syntax. The condition should come after the for loop. Python likely wont tell you this, because it may think you're trying to do something else. You can do one line if statements like this: a if condition else b, which will return a if the condition is true, and b if it isn't. So it may think that you're trying to do this one line if statement, and say that you're missing an else. The function could even implement in this way: x**2 if x > 0 else 0 for x in nums. This way if the x is negative it counts as 0, or in other words isn't counted towards the sum. But without this fix, the function will raise a syntax error

sqsum4(nums):

   This will square each number in x only if the current element "x" is greater than 0, or in other words positive. And then it returns the sum. So this function returns the expected output

Need in JAVA!!!!
Given a line of text as input, output the number of characters excluding spaces, periods, exclamation points, or commas.


Ex: If the input is:


Listen, Mr. Jones, calm down.

the output is:


21

Note: Account for all characters that aren't spaces, periods, exclamation points, or commas (Ex: "r", "2", "?").

Answers

The number of characters in the given code is 151 chars

What is a Character?

This refers to the single visual object that is used in computing to represent a text, symbol, or number.

Hence, we can see that we are asked to state the number of characters in the given code, excluding spaces, periods, exclamation points, or commas and the number is 151.

Note that the single and multi-line comments were NOT included.

Read more about java programming here:

https://brainly.com/question/26952414

#SPJ1

choose the 3 correct statements for the code below

Answers

The correct statements are:

An object of the ActivationLayer class has a name attribute.print(FCLayer(42)) prints FullyConnectedLayer.When creating an object of the BaseLayer class, the name argument must be given.What is Coding?

The term Computer coding is known to be seen as a kind of a tool that is often use in computer programming languages and it helps to give computers and machines a number of instructions on the things that need to be done or performed.

Note that in the code, the The correct statements are:

An object of the ActivationLayer class has a name attribute.print(FCLayer(42)) prints FullyConnectedLayer.When creating an object of the BaseLayer class, the name argument must be given.

See full question below

Choose the 3 correct statements for the code below.

An object of the ActivationLayer class has a name attribute.

An object of the BaseLayer class has a size attribute.

print(FCLayer(42)) prints FullyConnectedLayer.

When creating an object of the ActivationLayer class, the size argument must be given.

When creating an object of the BaseLayer class, the name argument must be given.

Learn more about Coding from

https://brainly.com/question/22654163

#SPJ1

A spherical buoy may be

Answers

A spherical buoy may be lettered rather than being numbered.

What is a spherical buoy?

A spherical buoy can be defined as a type of buoy of which the larger part of the superstructure or the upper part of the body that has a spherical shape and it's distinctively lettered.

In this context, we can infer and logically deduce that a spherical buoy may be lettered and it is usually anchored in a swimming pool to mark the course for swimmers and triathletes.

Read more on buoy here: https://brainly.com/question/14931928

#SPJ1

What is the name of data that is stored in memory?

Answers

Answer:

Persistent Data

Explanation:

Data in which is stored in your memory is called Persistent Data! :)

Answer:  Random access memory (RAM)

Explanation:

Scientist Galileo Galilei used the
telescope
to observe the stars and planets. This same tool has allowed modern
astronomers
to see objects that are billions of light years from Earth. This tool also detects things such as

Answers

Scientist Galileo Galilei used the telescope to observe the stars and planets.

What was the story of Scientist Galileo Galilei?

Galileo was a natural philosopher, astronomer, and mathematician who made major contributions to the creation of the scientific method and the disciplines of motion, astronomy, and strength of materials.

He also made ground-breaking telescopic discoveries, such as the discovery of Jupiter's four biggest moons.

Hence the correct option is A

Learn more about Scientist Galileo Galilei:

https://brainly.com/question/12024475

#SPJ1

Why is haptic feedback important?

Answers

[tex]\huge\underline{\red{A}\green{n}\blue{s}\purple{w}\pink{e}\orange{r} →}[/tex]

Haptic feedback is used to engage more of the user's senses to provide a deeper and more immersive experience. Products that offer haptic feedback, such as some game controllers, often provide different kinds of sensations to correspond with different visual and audio stimuli.

Explanation:

Hope it helps you !!

what is computer programming?​

Answers

Designing and building a computer program. Computer programmers write,modify, and test code

Select 3 true statements about Python class.
If a class inherits from multiple classes, the order of inheritance does not matter.

(In Python 3 or higher) If no class is inherited, it implicitly inherits the object class.

A class attribute exists as a unique object regardless of how many instances of the class are.

A class attribute can be used without an instance of that class.

Properties whose names start with _ (e.g. _name) are private properties and cannot be accessed outside of the corresponding class.

Answers

The true statements about Python class are:

(In Python 3 or higher) If no class is inherited, it implicitly inherits the object class.A class attribute exists as a unique object regardless of how many instances of the class are.A class attribute can be used without an instance of that class.

Can Python class inherit from multiple classes?

Yes, A class is one that can be gotten from more than one base class in Python. This is known to be multiple inheritance.

Note that The true statements about Python class are:

(In Python 3 or higher) If no class is inherited, it implicitly inherits the object class.A class attribute exists as a unique object regardless of how many instances of the class are.A class attribute can be used without an instance of that class.

Learn more about Python class from

https://brainly.com/question/26497128

#SPJ1

A binary floating-poi Select 3 true statements about Python primitive types.
32-bit integer type (a.k.a. int32) can represent integer value from -2^31 (-2,147,483,648) to 2^31-1 (2,147,483,647)
The int type in Python3 cannot represent a number greater than 2^31-1.
A binary floating-point method is used to represent fractions in binary numbers.
The decimal number 0.1 cannot be expressed without error in binary floating-point format.
The float type in Python3 can represent decimal 0.1 without error.nt method is used to represent fractions in binary numbers

Answers

The true statements about Python primitive types.

32-bit integer type (a.k.a. int32) can represent integer value from -2^31 (-2,147,483,648) to 2^31-1 (2,147,483,647)A binary floating-point method is used to represent fractions in binary numbers.The decimal number 0.1 cannot be expressed without error in binary floating-point format.

What are  Python primitive types?

The  Python primitive types is known to be made up of four primitive data types which are:

Integer.Float.String.Boolean.

Note that The true statements about Python primitive types.

32-bit integer type (a.k.a. int32) can represent integer value from -2^31 (-2,147,483,648) to 2^31-1 (2,147,483,647)A binary floating-point method is used to represent fractions in binary numbers.The decimal number 0.1 cannot be expressed without error in binary floating-point format.

Learn more about Python from

https://brainly.com/question/26497128

#SPJ1

More than 700 people in the United States have been infected with monkeypox virus American vector: the epidemic is spreading like a snowball.

Answers

An epidemic that is spreading like a snowball is one that is that is moving in a gradual or seasonal rate.

What is snowball spread of virus?

An epidemic is said to be spreading like a snowball if  it is said to be moving at a rate.

Note that in the case of monkey virus, the epidemic that is spreading like a snowball is one that is that is moving in a gradual or seasonal rate.

Learn more about epidemic  from

https://brainly.com/question/15452937

#SPJ1

What do I need a computer for? In other words, what are the types of tasks you need to use the computer for? For example:

.search the internet
.type assignments
. etc

Answers

Answer:

Adding Local User Accounts To Off-Campus Computers. ...

Adding AD User Accounts To On-Campus Computers. ...

Connecting Your Computer Cables. ...

Installing Software Using Microsoft Software Center. ...

Scan To Email. ...


ii) Explain how space and time overheads arise from use of paging, and how the
Translation Lookaside Buffer (TLB) mitigates the time overheads.

Answers

Answer:

A translation lookaside buffer (TLB) is a memory cache that is used to reduce the time taken to access a user memory location.[1] It is a part of the chip's memory-management unit (MMU). The TLB stores the recent translations of virtual memory to physical memory and can be called an address-translation cache. A TLB may reside between the CPU and the CPU cache, between CPU cache and the main memory or between the different levels of the multi-level cache. The majority of desktop, laptop, and server processors include one or more TLBS in the memory-management hardware, and it is nearly always present in any processor that utilizes paged or segmented virtual memory.

Space and time overheads arise from use of paging, and how the Translation Lookaside Buffer (TLB) mitigates the time overheads contains the most recent jvm to memory address translations.

What is Translation Lookaside Buffer?

A computer cache called a translation lookaside buffer (TLB) is employed to speed up the process of accessing memory locations. t is a component of the program memory on the semiconductor. Here between the CPU and also the CPU cache, here between PC and the primary storage, or among several layers of the multi-level cache are possible locations for a TLB.

Four or maybe more TLBSs are often present throughout the storage circuitry of desk, portable, and server CPUs, and they are almost always featured in computers that use paged or split memory management.

Learn more about Translation Lookaside Buffer, here:

https://brainly.com/question/13013952

#SPJ2

technology?
OA. Analyzing computer systems to protect computer networks from
cyber threats
OB. Planning, creating, testing, and maintaining applications used by
devices
OC. Planning, creating, testing, and maintaining physical computer
systems
OD. Analyzing organizational operations to find opportunities for
improvement

Answers

Answer:

D. Analyzing organizational operations to find opportunities for

improvement

Explanation:

It is option D because you are improving a device for a better future use, better technology.

Hope it helps!

Answer:

A. Analyzing computer systems to protect computer networks from

cyber threats

Explanation:

A company is looking for an employee to help organize customer information for the sales team. Which computer field includes this job?
A.
Security analysis
B.
Database support
C.
Systems analysis
D.
Network support

Answers

Answer:

A

Explanation:

security organises the customer's info online and in person for the sales team.

Answer: B DEFINITELY

Explanation:  DATABASE WOULD BE FOR SALES TO KEEP TRACK OF SALES AND LEDGERS, DEBITS, ADDRESSES, NOTES ON CUSTOMER, WHAT THEY BOUGHT, WHEN, WHAT YEAR, IS THERE A WARRANTY?

DATA BASE KEEPS ALL THEIR DEALINGS ORGANIZED AND UP TO DATE.

in quickbooks online what are the areas the client needs assessment tool focuses on to help gather information needed to select the right quickbooks subscription for a client

Answers

The areas client needs assessment tool focuses on are the areas of "what, when, who, and how" to gather the right needed to select the right QuickBooks Online subscription for a client.

What is an assessment tool?

A method or technique of comparing statistics to decide how a great deal someone is aware of and whether or not this know-how aligns with the larger image of an idea or framework is known as an assessment tool. Assessment strategies range primarily based totally on context and purpose.

Hence, In this context,  it is concluded that the Client Needs Assessment tool focuses on the areas of "what, when, who, and how" to gather the right needed to select the right QuickBooks Online subscription for a client.

learn more about assessment tools:

https://brainly.com/question/10580916

#SPJ1

What tool does a programmer use to produce Python source code?

Answers

Answer:

Cog is a simple code generation tool written in Python. We use it or its results every day in the production of Kubi. Kubi is a collaboration system embodied in a handful of different products.

Write a program that takes the radius of a sphere (a floating-point number) as input and then outputs the sphere’s:

Diameter (2 × radius)
Circumference (diameter × π)
Surface area (4 × π × radius2)
Volume (4/3 × π × radius3)

Answers

The program is an illustration of a sequential program.

Sequential programs are programs that do not require conditions

The program

The program written in Python is as follows:

radius = float(input("Radius: "))

diameter = 2 * radius

circumference = diameter * 3.14

surfaceArea = 4 * 3.14 * radius**2

volume = (4.0/3) * 3.14 * radius**3

print(diameter)

print(circumference)

print(surfaceArea)

print(volume)

Read more about Python programs at:

https://brainly.com/question/13246781


#SPJ1

How many types of Robots are there ?

Can you please Write them down.​

Answers

Answer:

There are 6.

Explanation:

1) Polar

2) Delta

3) Cartesian

4) SCARA

5) Cylindrical

6) Vertically articulated

The most common types of robots are

-Autonomous mobile robots (AMRs)

-Automated guided vehicles (AGVs)

-Robotic arms

-Humanoid robots

-Hybrids

-Cobots

Hope this helps :)

functions of memory card​

Answers

Answer:

store data

Explanation:

it is secondary storage device

how to implement fibonacci series in assembly language in ripes

Answers

Answer:

thanks so many times but you have the same one that you

The example of the implementation in RISC-V assembly language using Ripes:

What is the  fibonacci series

assembly

.data

result: .asciiz "Fibonacci Series: "

.text

.globl main

main:

 # Initialize registers

 li a0, 0     # F(0)

 li a1, 1     # F(1)

 li t0, 10    # Number of Fibonacci series elements to generate (adjust as needed)

 

 # Print the initial message

 la a5, result

 li a4, 20    # Length of the message

 li a7, 4     # Print system call

 ecall

 

 # Generate and print the Fibonacci series

 li t1, 2     # Loop counter starts at 2 (F(0) and F(1) already initialized)

loop:

 add t2, a0, a1   # Calculate the current Fibonacci number

 mv a0, a1        # Move previous number (F(n-1)) to a0

 mv a1, t2        # Move current number (F(n)) to a1

 # Print the Fibonacci number

 li a7, 1         # Print integer system call

 ecall

 addi t1, t1, 1   # Increment the loop counter

 blt t1, t0, loop # Loop until desired number of Fibonacci series elements

 # Exit program

 li a7, 10        # Exit system call

 ecall

Read more about  fibonacci series here:

https://brainly.com/question/29764204

#SPJ2

Other Questions
Which of the following is/are affected by the environmental factor "overexploitation"?1. Wild medicinal plants2. Game animals3. Fish stocks4. All of the choices Find the missing side the side of the triangle help Why do you think this language motivated people in the audience like fulcher of chartres to join the crusade? what did the crusade have to offer them? In which of the following systems are all of the forces acting on the exact same line of action? A passive eruption that primarily forms lava flows and minor scoria is termed a __________________ eruption. (a) Calculate the tension in a vertical strand of spiderweb if a spider of mass 5.00 10-5 kg hangs motionless on it. N(b) Calculate the tension in a horizontal strand of spiderweb if the same spider sits motionless in the middle of it much like the tightrope walker in Figure 4.13. The strand sags at an angle of 10.0 below the horizontal. NCompare this with the tension in the vertical strand (find their ratio). (tension in horizontal strand / tension in vertical strand) how are the amendments in the bill of right organzed Julissa works in the warehouse of a large online retailer. On Tuesday from 9:00 a.m. to 3:00 p.m., she found that she had walked 20,458 steps preparing orders to be shipped. Approximately how many steps did she walk each hour?3,409.6 steps3,409.ModifyingAbove 6 with bar steps4,091.6 steps4.091.ModifyingAbove 6 with bar steps An sRNA is isolated from a bacterial cell. What would you do to determine whether it is a cis-encoded or a trans-encoded sequence Given what you know about the aftermath of World War , why do you think totalitarian governments were on the rise? Each week, Antonia goes to a nature preserve that charges $3 admission, but her mom pays, so it is free for her. She asked permission to buy a pocket knife from the trail shop so she can practice whittling, but your mom will not allow the purchase. Here is the anticipated for each good (see image). a) Antonias grandfather comes to town and offers to pay for as many pocket knives as she wants. How many should she buy? Explain. b) What is the marginal utility of her first visit to the preserve?c) Antonias mom makes her return all the pocket knives, so shes back to zero. Antonia will now pay for her own preserve visits ($3). All the pocket knives are $5. Complete a table that shows the marginal utility per dollar for Antonias potential preserve visits and pocket knife purchases.d) For her birthday, Antonias mom gives her $20. She says that she is now mature enough to buy pocket knives, but she also most must purchase admission to the Preserve on her own. She buys as many preserve visits and pocket knives as she can. What is her optimal consumption bundle for visits and pocket knives? Explain. e) Does Antonia have any birthday money left? Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report covers encryption. What would Hisoka NOT include in his document Identify the correct explanation for each type of sentence.Drag each tile for the correct location.Tilesa complex sentence to show several ideasand give more weight to one idea thanthe othera compound sentence to give equal weightto two ideasa compound-complex sentence to show multipleideas with different relationshipsa simple sentence to clearly statea claimPairsPeople should vote in every election.arrowBoth Money is necessary for general well-being, butit does not guarantee happiness.arrowBoth When the timing is right, nothing can stop agroup of dedicated people working toward acause.arrowBoth Although some people may disagree, people whohave pets are happier, and they live longer. Differences between nucleus and vacuole Part AIn the table, identify four to five details that reflect the most important parts of the excerpt from Rogue Heart. Then paraphrase these details in your own words. On a coordinate plane, triangle A B C is shifted 4 units up and 3 units to the left to form triangle A prime B prime C prime.Use the figure to identify the correct rule for the translation.(x, y) Right-arrow (x 3, y + 4)(x, y) Right-arrow (x + 3, y 4)(x, y) Right-arrow (x 4, y + 3)(x, y) Right-arrow (x + 4, y 3) HIV attack of CD4 T cells causes suppression of both cell-mediated and humoral immune responses. Group of answer choices True False When the birth rate in a population is greater than the death rate, the population will generally __________.1. none of the choices2. decrease3. increase4. not change The function y=-x-3 is graphed only over the domain of (x1-8x 8). What is the range of the graph?O (v1-5 y 5)O y 1-5 y -1}O (y|1 y 5}Oy|1 y -1) Ly has 3 more dime than nickels and twice as many quarters than dimes. the value of his coins is $9.60. how many of each coin does he have?