Write a class named Car that has the following member variables:

• Year. An int that holds the car's model year.
• Make. A string object that holds the make if the car.
• Speed. An int that holds the car's current speed

In addition, the class should have the following member functions program that implements class structure.

• Constructor. The constructor should accept the car's vear and make arguments and assign these values to the object's year and make member variables. The constructor should initialize the speed member variable to 0.

• Accessors. Appropriate accessor methods should be created to allow values to be retrieved from the object's year, make, and speed member variables
• accelerate. The accelerate method should add 5 to the speed member variable each time it is called.
• brake. The brake method should subtract from the speed member variable each time it is called.
Write a program that will create the Car object. It will ask the users for the number of times the car will accelerate and brake.
(LOOK AT PIC BELOW, PYTHON))

Write A Class Named Car That Has The Following Member Variables: Year. An Int That Holds The Car's Model

Answers

Answer 1

An example implementation of the Car class in Python is given as follows:

class Car:

   def __init__(self, year, make):

       self.year = year

       self.make = make

       self.speed = 0

       

   def get_year(self):

       return self.year

   

   def get_make(self):

       return self.make

   

   def get_speed(self):

       return self.speed

   

   def accelerate(self):

       self.speed += 5

       

   def brake(self):

       self.speed -= 5

       if self.speed < 0:

           self.speed = 0

car = Car(2022, "Tesla")

accelerate_times = int(input("How many times do you want to accelerate? "))

brake_times = int(input("How many times do you want to brake? "))

for i in range(accelerate_times):

   car.accelerate()

   print("Accelerating... Speed is now", car.get_speed())

   

for i in range(brake_times):

   car.brake()

   print("Braking... Speed is now", car.get_speed())

What is the explanation for the above response?

This program creates a Car object with the year 2022 and make "Tesla", and then prompts the user for the number of times to accelerate and brake. It uses a for loop to call the accelerate and brake methods on the Car object the specified number of times, and prints the updated speed after each call.

The prompt requires creating a Car class with member variables year (int), make (string), and speed (int), as well as appropriate member functions, including constructor, accessors, accelerate (adds 5 to speed), and brake (subtracts from speed). The program should allow user input for how many times the car should accelerate and brake.

Learn more about Phyton at:

https://brainly.com/question/16757242

#SPJ1


Related Questions

12.
law deals with online actions, words, and ethics.
O A. Infringement
O B. Digital
O C. Phishing
O D. Spamming

Answers

B.Digital law deal with online actions

CORPULENT means:
Lean
Gaunt
Emaciated
Obese

Answers

CORPULENT means obese, which refers to a person who is excessively overweight or obese.

Help , I need help with this question

Answers

The tag that has been discontinued in HTML5 is A. <basetext.

How to explain the information

The <basefont> tag has been discontinued in HTML5. This tag was used to specify the base font size, face, and color for a web page.

In HTML5, it is recommended to use CSS to define the font styles instead of using deprecated font tags such as <basefont>. The <basetext> tag and <selects> tags are not valid HTML tags. However, the <textarea> tag is still a valid HTML tag in HTML5 and is used to create a multi-line text input field.

Learn more about html on

https://brainly.com/question/22241341

#SPJ1

Why is it important to format your spreadsheets and use conditional formatting?

Answers

Answer:

So people can read it and quickly make sense of the data


12 How can an antivirus protect your device?
A. It can backup data
B. It can increase its performance.
C.
can prevent data from getting corrupt.
D. It can protect it from overheating.
with

Answers

Answer down below:

An antivirus works by protecting your device and deleting and detecting any malicious code.

That being said, the answer to this question is C!

Hope this helps!

Answer:

C. can prevent data from getting corrupt.

Explanation:

I downloaded 3 games from Ytorrent and none of them have sound effects. What should I do?

Answers

Use VLC player, which typically supports all formats, or download the appropriate codec.

What is sound effects?

An artificially produced or enhanced sound, or sound process, is known as a sound effect and is used to highlight artistic or other material in movies, television programs, live performances, animation, video games, music, or other forms of media.

They were traditionally produced with foley in the 20th century.

Hardware or software tools called audio effects can alter the sound of an audio signal. Rate, feedback, and drive are just a few of the many parameters that can be used to influence effects.

Learn more about sound effects here:

https://brainly.com/question/30106391

#SPJ1

URGENT NEED HELP WITH 7.6 LESSON PRACTICE QUESTIONS 7 & 8

def mystery(a = 2, b = 1, c = 3): return 2 * a + b + 3 * c
What is the output for mystery(1)
What is the output for mystery()?

Answers

Explanation:

If we call the function with mystery(1), the value of a is assigned as 1 while the default values of b and c are used. Therefore, the output will be:

2 * a + b + 3 * c

= 2 * 1 + 1 + 3 * 3

= 2 + 1 + 9

= 12

If we call the function with mystery(), all the parameters will take their default values as given in the function definition. Therefore, the output will be:

2 * a + b + 3 * c

= 2 * 2 + 1 + 3 * 3

= 4 + 1 + 9

= 14

Please help with this exercise

Answers

The program based on the information that given is illustrated below.

How to depict the program

#include <iostream>

using namespace std

int main(){

int arr[5][5];

// sample taking 5 elements

arr[0][0] = 1232;arr[0][1] = 10;arr[0][2] = 23;arr[0][3] = 45;arr[0][4] = 56;

arr[1][0] = 2343;arr[1][1] = 45;arr[1][2] = 43;arr[1][3] = 24;arr[1][4] = 78;

arr[2][0] = 2344;arr[2][1] = 34;arr[2][2] = 45;arr[2][3] = 45;arr[2][4] = 45;

arr[3][0] = 3423;arr[3][1] = 67;arr[3][2] = 6;arr[3][3] = 65;arr[3][4] = 56;

arr[4][0] = 3425;arr[4][1] = 87;arr[4][2] = 46;arr[4][3] = 45;arr[4][4] = 66;

int ch,flag=1,i,j,id,min,max;

// looping for menu

while(flag){

cout<<endl;

cout<<"1 View All Students Records "<<endl;

cout<<"2 View Students Record by ID "<<endl;

cout<<"3 show highest and lowest final scores "<<endl;

cout<<"4 Quit"<<endl;

cin>>ch;

switch(ch){

case 1:

// displaying the all elements from the array

for(i=0;i<5;i++){

for(j=0;j<5;j++){

cout<<arr[i][j]<<"\t";

}

cout<<endl;

}

break;

case 2:

// reading Id from user and searching in array

cout<<"Enter Students ID";

cin>>id;

j=-1;

for(i=0;i<5;i++){

if(arr[i][0]==id)

for(j=0;j<5;j++)

cout<<arr[i][j]<<"\t";

}

// if Id notfound in array showing error message

if(j==-1)

cout<<id<<" ID does exist";

break;

case 3:

// finds min from the final scores

min=arr[0][4];

for(int i=0;i<5;i++)

if(min>arr[i][4])

min = arr[i][4];

// finds the max final scores

max=arr[0][4];

for(int i=0;i<5;i++)

if(max<arr[i][4])

max = arr[i][4];

cout<<"Max Final Score : "<<max;

cout<<"Min Final Score : "<<min;

break;

case 4:

flag = 0;

break;

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

CODING HOMEWORK:

I'm not getting the test case for Acme, Watervliet and Brooklyn. Anyone good at coding could help?

// MichiganCities.cpp - This program prints a message for invalid cities in Michigan.
// Input: Interactive
// Output: Error message or nothing

#include
#include
using namespace std;

int main()
{
// Declare variables
string inCity; // name of city to look up in array
const int NUM_CITIES = 10;
// Initialized array of cities
string citiesInMichigan[] = {"Acme", "Albion", "Detroit", "Watervliet", "Coloma", "Saginaw", "Richland", "Glenn", "Midland", "Brooklyn"};
bool foundIt = false; // Flag variable
int x; // Loop control variable

// Get user input
cout << "Enter name of city: ";
cin >> inCity;

// Write your loop here
for(x=0;x // Write your test statement here to see if there is
// a match. Set the flag to true if city is found.
if(citiesInMichigan[x] == inCity)
foundIt=true; }
if(!foundIt)
cout<<"Not a city in Michigan."<
// Test to see if city was not found to determine if
// "Not a city in Michigan" message should be printed.


return 0;

} // End of main()

Answers

Answer:

// MichiganCities.cpp - This program prints a message for invalid cities in Michigan.

// Input: Interactive

// Output: Error message or nothing

#include <iostream>

#include <string>

using namespace std;

int main()

{

   // Declare variables

   string inCity; // name of city to look up in array

   const int NUM_CITIES = 10;

   // Initialized array of cities

   string citiesInMichigan[] = {"Acme", "Albion", "Detroit", "Watervliet", "Coloma", "Saginaw", "Richland", "Glenn", "Midland", "Brooklyn"};

   bool foundIt = false; // Flag variable

   int x; // Loop control variable

   // Get user input

   cout << "Enter name of city: ";

   cin >> inCity;

   // Write your loop here

   for (x = 0; x < NUM_CITIES; x++) {

       // Write your test statement here to see if there is

       // a match. Set the flag to true if city is found.

       if (citiesInMichigan[x] == inCity) {

           foundIt = true;

           break;

       }

   }

   if (!foundIt)

       cout << "Not a city in Michigan." << endl;

   else

       cout << "Valid city in Michigan." << endl;

   return 0;

} // End of main()

Explanation:

In this version of the code, we added a loop that goes through the citiesInMichigan array and compares each element with the input city using an if statement. If a match is found, the foundIt flag is set to true and the loop is exited using break. Finally, we added an else block to the conditional statement that prints "Valid city in Michigan." if the city is found.

Create a program using classes that does the following in the zyLabs developer below. For this lab, you will be working with two different class files. To switch files, look for where it says "Current File" at the top of the developer window. Click the current file name, then select the file you need.
(1) Create two files to submit:
ItemToPurchase.java - Class definition
ShoppingCartPrinter.java - Contains main() method
Build the ItemToPurchase class with the following specifications:
Private fields
String itemName - Initialized in default constructor to "none"
int itemPrice - Initialized in default constructor to 0
int itemQuantity - Initialized in default constructor to 0
Default constructor
Public member methods (mutators & accessors)
setName() & getName() (2 pts)
setPrice() & getPrice() (2 pts)
setQuantity() & getQuantity() (2 pts)
(2) In main(), prompt the user for two items and create two objects of the ItemToPurchase class. Before prompting for the second item, call scnr.nextLine(); to allow the user to input a new string. (2 pts)
(3) Add the costs of the two items together and output the total cost. (2 pts)

Answers

Here's the code:

The Code

ItemToPurchase.java:

public class ItemToPurchase {

   private String itemName;

   private int itemPrice;

   private int itemQuantity;

   public ItemToPurchase() {

       itemName = "none";

      itemPrice = 0;

       itemQuantity = 0;

   }

   public void setName(String name) {

       itemName = name;

   }

   public String getName() {

       return itemName;

   }

   public void setPrice(int price) {

       itemPrice = price;

   }

   public int getPrice() {

       return itemPrice;

   }

   public void setQuantity(int quantity) {

       itemQuantity = quantity;

   }

   public int getQuantity() {

       return itemQuantity;

   }

}

ShoppingCartPrinter.java:

import java.util.Scanner;

public class ShoppingCartPrinter {

   public static void main(String[] args) {

      Scanner scnr = new Scanner(System.in);

       ItemToPurchase item1 = new ItemToPurchase();

       System.out.println("Item 1");

       System.out.println("Enter the item name:");

       item1.setName(scnr.nextLine());

       System.out.println("Enter the item price:");

       item1.setPrice(scnr.nextInt());

      System.out.println("Enter the item quantity:");

       item1.setQuantity(scnr.nextInt());

       scnr.nextLine();

       ItemToPurchase item2 = new ItemToPurchase();

       System.out.println("\nItem 2");

       System.out.println("Enter the item name:");

       item2.setName(scnr.nextLine());

      System.out.println("Enter the item price:");

       item2.setPrice(scnr.nextInt());

       System.out.println("Enter the item quantity:");

       item2.setQuantity(scnr.nextInt());

       int totalCost = item1.getPrice() * item1.getQuantity() + item2.getPrice() * item2.getQuantity();

      System.out.println("\nTotal cost: $" + totalCost);

   }

}

This implementation creates two objects of the ItemToPurchase class, prompts the user for their names, prices, and quantities, calculates the total cost, and prints it out.

Read more about programs here:

https://brainly.com/question/26134656

#SPJ1

HELP
Which of the following is an example of an object-oriented programming language?
A) Ruby
B) Python
C) C++
D) HTML

Answers

Answer:Java, C++, and Ruby

Explanation:

Like Python and JavaScript, many languages that are not strictly object-oriented also provide features like classes and objects inspired by object-oriented programming.

Construction a wall in to divide an office is it a project or no project

Answers

Answer:

Constructing a wall to divide an office can be considered a project.

A project is a temporary endeavor with a specific goal or objective, and constructing a wall to divide an office fits this definition. It has a specific goal (dividing the office) and is temporary in nature (once the wall is constructed, the project is complete).

Additionally, constructing a wall to divide an office may require planning, resources, and coordination with stakeholders such as the building owner, architects, engineers, contractors, and employees who will be impacted by the construction. This would further support the argument that it is indeed a project.

2/ kinite a program in pascall language that prompts the user to enter the amount of fe as paid. When the amount of fees paid is less than 20000 the program displays a message cyber services denied​

Answers

Answer:

Examples of few editors include Windows Notepad, OS Edit command, Brief, Epsilon, EMACS, and vim or vi. Name and version of text editor can vary on different operating systems. For example, Notepad will be used on Windows and vim or vi can be used on windows as well as Linux or UNIX.

Explanation: If this is not what your look for then am sorry but i can't help you.

Which of the following are easy/difficult to handle in Virtual-Circuit and Datagram subnets, and why?

i) Router memory space

ii)Quality-of-service

iii) Congestion control

iv) Address parsing time

Answers

Address parsing time

Read in a 3-character string from input into variable passCode. Declare a boolean variable containsAlpha and set containsAlpha to true if passCode contains an alphabetic character. Otherwise, set containsAlpha to false.

Ex: If the input is 4cx, then the output is:

Valid passcode

in c++

Answers

Here's the C++ code to accomplish the task:

#include <iostream>

#include <cstring>

#include <cctype>

using namespace std;

int main() {

   char passCode[4];

   bool containsAlpha = false;

   cout << "Enter a 3-character passcode: ";

   cin >> passCode;

   for (int i = 0; i < strlen(passCode); i++) {

       if (isalpha(passCode[i])) {

           containsAlpha = true;

           break;

       }

   }

   if (containsAlpha) {

       cout << "Valid passcode\n";

   } else {

       cout << "Invalid passcode\n";

   }

   return 0;

}

How to explain the program

In this code, we first declare the passCode variable as a character array of size 4 to accommodate the 3-character passcode plus the null terminator. We also declare the containsAlpha boolean variable and initialize it to false.

We then prompt the user to enter a 3-character passcode and read it into the passCode variable using the cin function.

Next, we loop through the characters in passCode using a for loop and use the isalpha function from the cctype library to check if the current character is alphabetic. If it is, we set containsAlpha to true and break out of the loop.

Finally, we use an if-else statement to check the value of containsAlpha and output either "Valid passcode" or "Invalid passcode" accordingly.

Learn more about program on:

https://brainly.com/question/1538272

#SPJ1

You have been asked to put together a training session for new users of the School database. What items would you want to make sure that you cover in your training session?

Answers

New users of the School database should get training in navigation, data entry, data retrieval, security, and database introduction.

What constitutes a training activity's five components?

Fortunately for you, whether at the gym or elsewhere, there are five fundamental components that you may concentrate on to achieve your wellness goals: cardiovascular fitness, strength training, core exercises, flexibility, and stretching. The majority of fitness training programmes are built around aerobic fitness, generally known as cardio.

What portion of training is the most crucial?

Any effective training program's main objective is to help participants learn new techniques and procedures. Instead of focusing on each and every aspect of an employee's job, we've found that the best training plan examples pinpoint the fundamental duties of each position.

To know more about database visit:-

https://brainly.com/question/30634903

#SPJ1

672.2The internet 24A buffer is 2MiB in size. The lower limit of the buffer is set at 200KiB and the higher limit is set at 1.8MiB.Data is being streamed at 1.5Mbps and the media player is taking data at the rate 600kbps.You may assume a megabit is 1048576bits and a kilobit is 1024bits.a)Explain why the buffer is needed.[2]b)i)Calculate the amount of data stored in the buffer after 2 seconds of streaming and playback.You may assume that the buffer already contains 200KiB of data.[4]ii)By using different time values (such as 4 secs, 6 secs, 8 secs, and so on) determine how long it will take before the buffer reaches its higher limit (1.8MiB).[5]c)Describe how the problem calculated in part b) ii) can be overcome so that a 30-minute video can be watched without frequent pausing of playback

Answers

a) The buffer is needed to ensure smooth playback of streamed media by storing a certain amount of data in advance. This is done to prevent interruptions due to network congestion or variations in the streaming rate.

How to calculate the data

b) i) The amount of data streamed in 2 seconds is (1.5Mbps * 2s) = 3MB. The amount of data played back in 2 seconds is (600kbps * 2s) = 150KB. Therefore, the amount of data stored in the buffer after 2 seconds is (3MB - 150KB - 200KiB) = 2.6MB.

ii) To determine how long it will take before the buffer reaches its higher limit of 1.8MiB, we can use the following formula:

Time to reach limit = (higher limit - lower limit - current buffer size) / streaming rate

= (1.8MiB - 200KiB - 2MiB) / 1.5Mbps

= 8 seconds

Therefore, it will take 8 seconds for the buffer to reach its higher limit.

c) To overcome the problem of frequent pausing of playback, a larger buffer can be used. This will allow more data to be stored in advance, reducing the impact of network congestion or variations in the streaming rate.'

Additionally, adaptive bitrate streaming can be used, where the streaming rate is dynamically adjusted based on the available network bandwidth, to ensure a more consistent streaming experience. Finally, a content delivery network (CDN) can be used to deliver the media from servers located closer to the viewer, reducing the impact of network latency and improving overall streaming performance.

Read more about buffer sizes here:

https://brainly.com/question/30557054

#SJP1

Implement the RC4 stream cipher in C++. User should be able to enter any key that is 5 bytes to 32 bytes
long. Be sure to discard the first 3072 bytes of the pseudo random numbers. THE KEY OR THE INPUT
TEXT MUST NOT BE HARD CODED IN THE PROGRAM.
Test your program with the following plain text:
https://uhdowntownmy.sharepoint.com/:t:/g/personal/yuans_uhd_edu/EUUKjk0iYzNOgyktdmRzErABOqsOfCYSFQ3VBwMk2
njKlQ?e=TpiLt3
You should write two programs: encryption and decryption. The encryption program should input the
plaintext file and output a cipher text in hex. The decryption program should input the cipher text file in
hex and output the plaintext.
Submit the following:
1. Source code of the encryption program.
2. A screen shot showing the encryption with a 5 byte key.
3. The cipher text from the encryption, saved in hexadecimal (you may want to use the “hex”
output manipulator)
4. Source code of the decryption program.
5. A screen shot showing the decryption of the cipher text with the same 5 byte key.
6. The plaintext from the decryption of the cipher text (you need to convert hex text to number)
Put everything in one PDF or WORD file. Do not zip

Answers

RC4 is a symmetric key stream cipher that is widely used for secure communication over the internet. It operates on bytes of data and generates a stream of pseudo-random bytes that are XORed with the plaintext to produce the ciphertext.

What is the program  about?

The RC4 algorithm consists of two parts: key setup and encryption/decryption.

Key setup:

Initialize the S-box with a permutation of the values 0 to 255, based on the key.Use the S-box to generate a pseudo-random stream of bytes called the keystream.

Encryption/decryption:

XOR each byte of the plaintext with the corresponding byte of the keystream to produce the ciphertext.To decrypt the ciphertext, repeat the XOR operation using the same keystream.

To implement RC4 in C++, you would need to write code to perform the following steps:

Read the key and plaintext/ciphertext from a file or user input.Perform key setup to generate the keystream.XOR the plaintext/ciphertext with the keystream to produce the ciphertext/plaintext.Write the ciphertext/plaintext to a file or output it to the console.

Therefore, below are some general guidelines on how to implement RC4 in C++:

Declare arrays to store the key, plaintext/ciphertext, S-box, and keystream.Read the key and plaintext/ciphertext from a file or user input and store them in the appropriate arrays.Initialize the S-box with a permutation of the values 0 to 255 based on the key.Use the S-box to generate the keystream by iterating over the plaintext/ciphertext and XORing each byte with a pseudo-random value from the S-box.Write the ciphertext/plaintext to a file or output it to the console.

Read more about program here:

https://brainly.com/question/23275071

#SPJ1

Which of the following is not a major landmark of fifth generation computers? a. Wide application of vector processing b. Introduction of parallel processing technology c. Wide use of computer networks and the increasing use of single-user workstations d. None of the options​

Answers

Answer:

d. None of the options is the correct answer since all of the options listed are major landmarks of fifth-generation computers.

Explanation:

The development of fifth-generation computers was characterized by advancements in vector processing, parallel processing, computer networks, and the use of single-user workstations. These advancements helped to improve the performance, capabilities, and functionality of computers and paved the way for further technological developments in the field of computing.

Wide use of computer networks and the increasing use of single-user workstations is not a major landmark of fifth generation computers. The correct option is c.

What is computer network?

A computer network is a collection of connected computing devices that share resources, data, and information. Computers, servers, routers, switches, printers, and other peripherals are examples of such devices.

The widespread use of computer networks and the increasing use of single-user workstations is not a significant feature of fifth generation computers because they were already common in the fourth generation.

Fifth-generation computers are notable for their use of advanced parallel processing technologies, artificial intelligence, natural language processing, expert systems, and high-level programming languages.

Furthermore, fifth-generation computers are built with advanced user interfaces and multimedia applications in mind.

Thus, the correct option is c.

For more details regarding computer network, visit:

https://brainly.com/question/14276789

#SPJ2

#include
#include
#include
#include

using namespace std;

class user{
protected:
string courseCode,coursename,desc,position,un,pw;

public:

void welcome(){
cout<<"========Welcome to the university student registration system========"< >position;
}


string login(){
int count=0;
string sa;


cout<<"Enter user name: ";
cin>>un;
cout<<"Enter password: ";
cin>>pw;


ifstream input("user.txt");


while(!input.eof()){
getline(input,sa);
if((count=sa.find(un,0))!=string::npos){
if((count=sa.find(pw,0))!=string::npos){
cout<<"Your Login is successful"< >courseCode;
myfile1< >nic;
myfile2< >pos;
myfile2< >un;
myfile2< >pw;
myfile2< >fword;

viewStudent();


}

list.close();

remove("temp.txt");
}


void viewStudent(){

ifstream stdata("user.txt");
while(!stdata.eof()){

getline(stdata,data);
if((count=data.find(fword,0))!=string::npos){
cout< >un;
cout<<"Enter password: ";
cin>>pw;

ifstream input("user.txt");

while(!input.eof()){
getline(input,sa);
if((count=sa.find(un,0))!=string::npos){
if((count=sa.find(pw,0))!=string::npos){
cout<<"Your Login is successful"< >courses;

for(int i=0;i >choice;
regsubs< >position;

cout<<"\n1.Login\n2.Exit";
cin>>choice;

switch(choice){
case 1:

if(position=="admin"){
a1.login();
cout<<"Do you need....\n1.Create new account\n2.Create new course"< >choice2;

if(choice2==1){
a1.createAccount();
}
else if(choice2==2){
a1.createCourse();
}

}
else if(position=="management"){
m1.login();
m1.seeStudents();
}
else if(position=="lecturer"){
ac1.login();
//returnval2=
ac1.getusername();
ac1.listStudent();
//ac1.viewStudent();
}
else if(position=="student"){
name= s1.login();
if(name!="f"){
s1.subReg();
}

}
else{
cout<<"not a valid user";
}
break;
case 2:
cout<<"Thank you for visiting..."< break;
}

return 0;

}

Answers

This code seems to be a student registration system where users can create accounts, register for courses, and view their information. It includes classes for different types of users, such as administrators, management, lecturers, and students.

What does the code do?

The code starts by including several libraries, including iostream and fstream, which are used for input and output and file handling, respectively.

The main class is called "user," which is then inherited by other classes for different types of users. The "user" class has several protected variables, including courseCode, coursename, desc, position, un, and pw, which are used to store information such as course codes, course names, descriptions, and user login credentials.

The "welcome" function is used to display a welcome message to the user, while the "login" function is used to prompt the user to enter their login credentials and check if they are valid.

The "viewStudent" function is used to display information about the student, such as their courses and registration details.

The main function includes a menu that allows users to log in and perform various actions, such as creating new accounts, registering for courses, and viewing information. The menu is implemented using a switch statement that calls different functions based on the user's position.

Overall, the code seems to be a work-in-progress, with several missing pieces, such as the implementation of the "createAccount" and "createCourse" functions, and some parts of the code seem to be incomplete, such as the "regsubs" function, which is missing the implementation of the switch statement.

Read more about programs here:

https://brainly.com/question/26134656

#SPJ1

Deciding you need to get a "good" job because that is what "smart" people do, reflects intrinsic motivation.

Answers

Deciding you need to get a "good" job because that is what "smart" people do, reflects intrinsic motivation is false.

What is intrinsic motivation?

Intrinsic motivation refers to engaging in an activity or behavior because it is inherently enjoyable or fulfilling, rather than for any external reward or pressure. For example, someone who enjoys playing the piano because it brings them joy and a sense of accomplishment is intrinsically motivated to play the piano.

Extrinsic motivation, on the other hand, refers to engaging in an activity or behavior for external reasons, such as receiving a reward, avoiding punishment, or meeting external expectations. For example, someone who practices the piano to win a music competition or to please their parents is extrinsically motivated to play the piano.

Therefore, In the given statement, the motivation for getting a "good" job is based on external factors such as societal expectations and the desire for success and status, rather than internal enjoyment or fulfillment.

Read more about motivation here:

https://brainly.com/question/15542056

#SPJ1

HELP
Which programming language is best suited for designing mobile applications?
A) Python
B) Ruby
C) HTML5
D) PHP

Answers

Answer: python

Explanation:

I find it easiest to work with

16.
is a field of study that helps to protect electronic data.
O A. Cyberterrorism
O B. Digital security
O C. Hacking
D. Cybersecurity

Answers

The answer is D: cybersecurity

Which of the following is not a term used as a synonym for module?
O a. procedure
O b. object
O c. subroutine
O d. method

Answers

C is correct I hope you get A

In Microsoft word application, it marks what it 'thinks' are grammatically and styles errors underline with a..........
a. red wavy.
b. green wavy
c. blue wavy
d. misspelled word error

Answers

The answer is Option B, a green wavy line.

what is multimedia?

Answers

Answer:

The combined use of media, such as movies, music, lighting, and the Internet, as for education, entertainment, or advertising.

I doubt anyone has the answer to this but say for instance that I made a side-email and used the side email as a recovery for a private email but the side email has already been put into a school computer. Do y’all think people could see the history of my private email or no?
Btw, I changed the recovery email for my private account but even with the side-email being used to begin with has me real paranoid.

Answers

Answer:

if you are using your school email account on your own computer and home network, it is unlikely that your school can see or track your search history or web activity. However, if you are using your school email account on a school computer or network, they may be able to monitor your activity through a proxy or firewall.

Explanation:

schools may have access to your email traffic and usage if you use their email account, regardless of the device or network you use. They may have an Acceptable Use Policy that allows them to monitor your email for security or network management reasons.

Therefore, it is advisable to refrain from using your school email account as a profile on your web browser or for logging into other websites. You may want to use your personal email account as your default profile on your computer and browser.

you should always check with your school for their specific policies and practices regarding email and internet privacy.

No because they are two different emails
But unless they have access to the Side email
And they log into ur private email using ur side email for recovery then they can see ur private email history and all that stuff
But they still can track some things if you are using the school computer or school wifi or both they can track all of that stuff

6. Explain the steps that should be taken to delete a section break. (3)

Answers

If you added section breaks to your manuscript, formatting marks make it simple to determine where they start and end. Choose Display all nonprinting characters under Home by going to Home. Press Delete after choosing the section break.

What kinds of characters are not printable examples?Characters used in word processors for designing information that are not printed out are known as non-printing characters or formatting marks. On the monitor, they can also alter how things are displayed. Pilcrow, space, non-breaking space, tab character, etc. are among the most popular non-printable characters in word processors.Carriage return, form feed, line feed, backspace, escape, horizontal tab, and vertical tab are some of the most used non-printable symbols.The display of these unique characters makes it simpler to comprehend the spacing and structure in your work. For instance, it is obvious when you have added an extra carriage return or two spaces between words.

To learn more about nonprinting characters, refer to:

https://brainly.com/question/9015633

3.4.4 go down the slide part two code pls

Answers

It seems like you are looking for help with a coding problem related to "3.4.4 go down the slide part two." To better assist you, I will need more context and information about the coding language and problem details.


However, here is a general outline of how to approach a slide-based coding problem:

1. Identify the programming language you are using (e.g., Python, JavaScript, Java, etc.).
2. Define the slide structure and any related variables or objects. For example, in an object-oriented language, you might create a Slide class with properties like height, width, and position.
3. Create a function or method for the "go down the slide" action. This function should take any necessary parameters (e.g., user input or slide properties) and return an updated state for the slide and/or user.
4. Implement the logic for moving down the slide, taking into account any physics or rules specific to your problem. This could involve updating the position, velocity, or other attributes of the user and slide objects.
5. Test your code to ensure it works correctly, and modify it as needed based on the desired outcome or any additional requirements.

Please provide more information about your specific problem so I can offer more tailored guidance.

For such more question on programming

https://brainly.com/question/16936315

#SPJ11

why do some people worry that the European Union may restrict neon lights

Answers

Due to worries about energy efficiency and the environment, some people are concerned that the European Union may ban neon lights. Neon lights need a lot of electricity and have gas inside them.

What effects do neon lights have on the environment?

Because neon is chemically inert and doesn't create any compounds, it has no effect on the environment and poses no threat to it. There is no evidence that this element harms the environment.

What was the reason of the neon lights' light emission?

Neon lights are a type of cold cathode gas discharge light.. A sealed glass tube with a metal electrode at each end that is filled with one of many gases under low pressure is known as a neon tube.

To know more about European Union visit:-

https://brainly.com/question/1683533

#SPJ1

Other Questions
In the figure below DB and AC are diameters of circle P. The length of PB is 8 units . What is the length of DC People who study the material remains of ancient civilizations are known as Paula is creating her personal budget by completing a table. One column lists her sources and amounts of income, and the other column lists her expenditures. Choose TWO examples of what she should consider for her "expenditures" column.ResponsesA She wrote a check for $100 for her electric bill.She wrote a check for $100 for her electric bill.B She received $3,100 in her paycheck last week.She received $3,100 in her paycheck last week.C She sold her old kitchen table to a neighbor for $50.She sold her old kitchen table to a neighbor for $50.D She got $100 from her grandmother for her birthday.She got $100 from her grandmother for her birthday.E She ordered a new outdoor rug online for $250. A superhero action figure has volume 1700 cubic centimeters. The figure is dilated to create a store display.The volume of the dilated figure is 25,500 cubic centimetersWhat was the approximate scale factor of the dilation? (Round your answer to the nearest tenth, one decimal place ex. 4.2) The image of the point ( 6 , 9 ) (6,9) under a translation is ( 11 , 4 ) (11,4). Find the coordinates of the image of the point ( 3 , 2 ) (3,2) under the same translation Upon its creation, many states had created and utilized __________ rather than using a national form. Noah describes various people's reactions to his appearance. What effect do these descriptions have on this section's tone? In the scenario below, the reference to "most participants" is an example of which type of fallacy? A chain pizza restaurant claims they conducted a poll in which 95% of participants believed their pizza used higher quality ingredients than a competitive chain. Because the advertisement states that many people believe in the high quality of the chain's ingredients, customers may believewithout having tried the pizzathat the ingredients are delicious.straw man appeal to vague authorityno true Scotsmanappeal to ignorance (60 points) Find the length of line AB. Which one does not belong and why?Formal operations SensorimotorPreconventional Concrete operations Cul ser el fenotipo de un individuo I a Find the maximum value of = subject to the cost constraint K + 4L = 16. Estimate the change in the optimal value of Q if the cost constraint is changes to K + 4L = 17 What is not a common complaint about MBO? marx saw capitalism as a progressive force for all of the reasons listed below except one. which is not a reason that he saw capitalism as progressive? Solve the system by substitution if you get a decimal round to the nearest hundred how can international influences lead to nondemocratic regimes? a. international organizations prefer to interact with nondemocratic regimes and advocate for their establishment. b. nondemocratic regimes struggle to gain international legitimacy. c. democracies are more likely to trade with nondemocratic regimes as there are fewer people in the government with whom they have to negotiate. d. the legacy of boundaries drawn by imperial powers has often led to internally divided states prone to nondemocratic regimes. some toxic substances degrade once released into the environment. what controls the rate of degradation? group of answer choices all of the above moisture chemistry of the substance temperature sun exposure which behavior would be typical for a preadolescent girl in the united states? group of answer choices learning to listen and resisting defensiveness are steps toward becoming group of answer choices better at making decisions. better at receiving feedback. Mr. Woods is buying ice cream for two of his students, Moses and Gaby. They each get one scoop of ice cream. Gaby wants ice cream in a cone, but she is a slow eater. Moses wants a cup because he is a bit messy and doesnt want to drip any ice cream. Each scoop is a perfect sphere and has a radius of 5 cm. The height of the cup and cone are both 12 cm. and the radius of each container is the same as each scoop of ice cream.