7.4 Lesson Practice (projectstem): what is output if the user is enters 2?​

7.4 Lesson Practice (projectstem): What Is Output If The User Is Enters 2?

Answers

Answer 1

Answer:

18

Explanation:

lets go step by step.

the function called tryIt has a value, a variable named "a". this "a" variable will be whatever the user enters when the program says, Enter a number.

ok so if we enter "a" as 2, and b in the function will always be 7, and 2 + 7 equals 9,

and the ans variable (short for answer) will take the result of the function (9) and multiply it by 2,

then the answer is 18


Related Questions

Ingrid works in the information technology department of a big company. Whenever the company hires someone new, she has to set up a new computer for them. In this scenario, Ingrid will easily be able to set up a computer because the information on how to set up the computer is stored in her Group of answer choices procedural memory. episodic memory. semantic memory. flashbulb memory.

Answers

Answer:

procedural memory

Explanation:

Procedural memory is a type of implicit memory (unconscious, long-term memory) which aids the performance of particular types of tasks without conscious awareness of these previous experiences.

jessica has connected her new printer to her windows 10 computer, but windows is not recognizing it. what should she do?

Answers

reconnect the printer or you could  Explanation:

If Windows 10 is not recognizing Jessica's new printer, she should take the following steps:

Check the physical connections: Ensure that the printer is properly connected to the computer via a USB cable or a network connection.

The Steps to take

Restart both devices: Restart the computer and the printer to refresh the system and establish a new connection.

Update printer drivers: Visit the printer manufacturer's website and download the latest drivers specific to her printer model. Install the drivers on the computer.

Run the printer troubleshooter: Go to the Windows settings, select "Update & Security," then "Troubleshoot." Choose "Printer" and follow the on-screen instructions to diagnose and fix any issues.

Read more about printers here:

https://brainly.com/question/31051187

#SPJ2

Apple computers ship their computer parts to India to be made, and station their tech support in India. This is an example of a:

Answers

Companies are known to set up different branches. This is an example of a Global assembly line.  

An assembly line is known to be a production process that breaks down the manufacture of goods into different steps that are completed in a known sequence.

These lines are often used method in the mass production of products as they reduce labor costs.

Global Assembly Line  is simply known as distributed manufacturing method that entails the product research and development in wealthy countries and assemblage in poorer countries.

Learn more from

https://brainly.com/question/2954967

Answer:

Shipping?

Explanation:

No options sooo

why are extensions necessary in scratch programming as a whole?​

Answers

Scratch extensions are vital for scratch to interface with the external hardware and information.

Scratch simply means a free programming language where an individual can create their own interactive stories.

It's simply the world's largest coding community for children. Scratch extensions are vital for scratch to interface with the external hardware and information.

Read related link on:

https://brainly.com/question/15418798

Lauren is a network technician monitoring performance on the local area network (LAN). She becomes alarmed when the network utilization reaches 95 percent for a particular time of day. How does she know what the utilization is normally like

Answers

It uses network usage monitoring software to know the level of traffic on that local network.

We can arrive at this answer because:

Network monitoring is an important activity to avoid overloading or underutilizing a local network.This allows the network to be manipulated to promote good performance and provide adequate traffic to users.

To know the level of use of a network it is necessary to use network monitoring software. An example of this type of software is the Capsa Network Analyzer, which also allows the elaboration of strategies to increase, stabilize or decrease network utilization.

More information:

https://brainly.com/question/8118353

when trying to solve a problem, bret uses a logical, step-by-step formula called

Answers

The logical, step-by-step formula that Bret uses when trying to solve a problem is called an algorithm.

An algorithm refers to a standard formula (procedures) which comprises a set of finite steps or instructions that is typically used for solving a problem on a computer.

This ultimately implies that, an algorithm is a standard, logical formula containing the step-by-step rules for proffering a solution to a particular problem on a computer.

In this context, Bret uses a logical, step-by-step formula called an algorithm, when trying to solve a problem.

Read more on algorithm here: https://brainly.com/question/24793921

Which is the proper way to call the function three circles?​

Answers

Answer: d. three_circles()

Explanation:

A presenter selects multimedia materials primarily based on their ability to organize data. Distract the audience. Introduce information. Emphasize a point.

Answers

Multimedia materials encompass video, audio and pictorial elements of a presentation. These materials are useful extremely useful when emphasizing a point.

In other to establish importance, emphasis has to be laid on the key points of a lesson, teaching or information.

With multimedia tools, the important points could be aired verbally, diagrammatically with annotations or using live visuals to establish the proposed points.

Learn more : https://brainly.com/question/25682762

which tool is used to create a selection by drawing it free hand? (ellipse/rectangle/free select/All) ​

Answers

Answer:

The lasso tool

By clicking down and dragging, the lasso tool allows you by freehand to draw the selection line. Many programs offer different types of lasso tools that can be used to make selections. The polygon lasso tool allows you to create a selection by clicking on individual points that connect to create a selection line.

Which of these statements is true about text superimposed over a photograph on a
slide?
It should never be done.
It should always be done.
It should have high color contrast.
O It should have low color contrast.

Answers

Answer:

It should have high color contrast.

Michelle wants to define the scope of a software development project for the benefit of her company. How does defining the scope of a

software development project help a company?


A It helps communicate effectively with the client

B. It helps deliver a project as per the client's requirements.

C It helps prepare a legal agreement

D. It helps decide the project budget

Answers

Answer:

im pretty sure its A

Explanation:

it makes more sense

Answer:

It helps deliver a project as per the client’s requirements.

Trust me... I took the test

Methods that set values are called ____ methods. Group of answer choices modifier mutator creator access

Answers

Answer:

modifier methods.

Explanation:

Hey, can somebody convert this Pseudocode into a Python Program, I've been struggling to do so for a while.

Answers

Answer:

print("Enter a positive whole number: ")

NumberIn = int(input())

NumberOut = 0

Count = 0

while NumberIn > 0:

   Count = Count + 1

   PartValue = NumberIn % 2

   NumberIn = NumberIn // 2

   for i in range(1, Count - 1):

       PartValue = PartValue * 10

   NumberOut = NumberOut + PartValue

print("The result is: " + str(NumberOut))

Outputs:

Enter a positive whole number:  

22

The result is: 1011

Enter a positive whole number:  

29

The result is: 1111

Enter a positive whole number:  

-1

The result is: 0

The term ________ refers to software that monitors a user's activity on a computer and on the Internet, often installed without the user's knowledge.

Answers

Answer:

The term spyware refers to software that monitors a user's activity on a computer and on the Internet, often installed without the user's knowledge.

how many pokemon games have you all played i've played 14

Answers

Answer: Too much to count.

Explanation:

so i've played
Pokémon Brilliant Diamond
Pokémon Unite
Pokémon Café Mix
Pokémon Sword and Shield
Pokémon Masters EX
Pokémon: Let's Go, Pikachu!
Pokémon Quest
Pokémon Ultra Sun
Pokémon: Magikarp Jump
Pokémon GO
Pokémon Omega Ruby
Pokemon X
Pokémon Black and White
Pokémon HeartGold
Pokémon Battle Revolution
Pokémon FireRed
and Pokémon Stadium
so 19 individual games

using iot to track packages, containers, and other bulkware are examples of what type of smart iot technologies?

Answers

There are technology that are used to detect and identify objects with tracking tag. The statement is an example Smart logistics IOT technologies.

Smart logistics is commonly called Connected logistics.  It helps or allows us to have near real-time tracking of movement/delivery of goods and services.

It is often used by ECommerce companies, food delivery companies, app-based taxi service companies, online markets etc.

 

In the logistics process, Internet of things can aid an individual by tracking goods and services as it saves time.

Learn more from

https://brainly.com/question/19995128

: Describe the type of gameplay seen during early video games (ex. Spacewar!, Pong).

Answers

Answer:

Computer scientists began building rudimentary games and simulations on mainframe computers in the 1950s and 1960s, with MIT's Spacewar! in 1962 being one of the first such games to be played with a video display. The first consumer-ready video game hardware arrived in the early 1970s, with the Magnavox Odyssey, the first home video game system, and the first arcade video games from Atari, Computer Space and Pong, the latter of which was later transformed into a home console version. Pong's success in arcades and at home prompted numerous firms to create clones of the game, resulting in a market contraction in 1978 owing to oversaturation and a lack of innovation.

URGENT The HTML tag of a table cell content is

A. True
B. False

Answers

true ! its correct - have a great day

how are digital computer classified on different types​

Answers

Answer: we can sub-categorize digital computers as General Purpose Computer & Special Purpose Computer.

Explain what each line of code does:

a) const PI = 3.14

b) radius = float(input(“Enter radius: ”))

c) Area = PI * radius * radius

d) print(area)

Answers

Answer:

10 please mark me as brainleast

Present your opinions about using robots to help with household routines.​

Answers

Answer:

I believe robots helping with household routines is great!  Robots hold have great  capability to assist senior 's. Robots can hand appropriate medicines to older adults on time. They can mop the floor super fat and super good. Additionally, there are robots that can lift people up and move them to a certain place!

Explanation:

Usually a ________ in Java code indicates the end of a data structure. Group of answer choices backslash character forward slash character null reference null pointer

Answers

Answer:

null reference.

Explanation:

what are overlapping geographical areas within a cellular network called?

Answers

Overlapping geographical areas within a cellular network is called cells

What is disadvantages of disk maintenance

Answers

Answer:

The torque generated on the axle (for a normal rear mounted disk caliper) is down - the same direction as the dropouts.

one big disadvantage of disks is that has yet been mentioned is their ability to eject the front wheel when using a tradition QR axle.

Explanation:

CAN I GET BRAINLIST

what is the difference between registered and certified mail

Answers

Answer:

1. Certified mail provides a receipt for the sender and for an additional fee, will receive a copy of the recipient's signature upon his receipt of the mail.

2. registered mail provides the sender a receipt and detailed records of his mail's location.

How do people get in your computer

Answers

Answer:

????

Explanation:

This is absurd, you cannot enter your computer. it is to tiny for you to fit in.

Answer:

Explanation:

I don’t know

An Internet address is a unique binary number assigned to a host and used for all communication with the host. Group of answer choices True False

Answers

Answer:

the correct answer is true

what is your favorite pokemon game

Answers

Answer:

all.

Explanation:

Answer:

pokemon moon

Explanation:

The service known as ___ contains original content in the form of live or recorded streams showing individuals playing video games.

Answers

Twitch is an online service that comprises original content in the form of live or recorded streams and it is typically focused on showing various individuals that are playing video games.

Twitch is an online (web) service that was launched in June 2011 and it derived its name from twitch gaming such as video games that are mainly about fast action and the use of reflexes by the game players.

The main purpose of Twitch is to avail game players the opportunity to stream or show live or recorded videos of themselves playing video games.

Read more: https://brainly.com/question/21694571

_______ is a medium-range wireless network. ________ is a medium-range wireless network. Cellular radio LTE UWB Wi-Fi

Answers

Wireless fidelity (Wi-Fi) is known simply as a wired LAN that does not have cables. Wifi is a medium-range wireless network.

WiFi configuration is made of of transmitter with an antenna. It is the wireless access point because it connects to a wired LAN or to satellite dishes that gives an Internet connection.

Wi-Fi is the mostly used type of medium-range wireless communication system.

Medium-range Wi-Fi signal can take about 100 meters and they also not take as far as cellular signals.

Learn more from

https://brainly.com/question/20812811

Other Questions
PLS HELP AMSWER ANYONE PLS ILL GIVE BRAINLKEST THANKS why are women's right not realized in Nepal? V= U + atU=2 a=-5 t=1/2What is the value of V? The student investigates how the resistance of a thermistor varies with temperature. The student has a power supply, a thermistor, an ammeter, a voltmeter and some connecting leads. Describe an investigation the student could carry out to measure the resistance of a thermistor between 10 C and 70 C.Your answer should include:1. Any other apparatus the student will need2. The measurements to be taken3. How the data should be processed.(This question is worth 6 marks on my assignment so I just really want to get down the best possible answer for it.) 10 pointsA bank charges $27 every week. Which integer shows the amountcharged after 5 weeks? A deal is a deal, so here is a good one, let's see who gets it right. I had $10. 0. My mom gives me $30. 00, my dad gave me $30. 0. My aunt and uncle give $100. 0. I had another $10. 0. How much money did i have? the right answer will be deleted & you will be asked to repost the question on your page. Find the value for x15 points for you plus brainliest, 5 star and thanks on answer and profile True or false: Social shopping involves sending e-mails to specific customers about new products that may be of interest to them. 1. Complete the problem by using your calculator. Round your answer to three decimal places.If f(x)=x^3 7x^2+ 3 find f(-2) and f(3/4)a. f(-2) = 3 and f(3/4)= 2.728b. f(-2)= 3 and f(3/4)= 10c. f(-2)=-33 and f(3/4)=-0.516d. f(-2)= 7 and f(3/4)= 21e. f(-2)= 10 and f(3/4)=-0.968nhing utility Round Which of the following best describes why slavery developed in the North American colonies?Select the best answer from the choices provided.A. Unlike indentured servants, enslaved African Americans did not need to be replaced constantly.B. Unlike indentured servants, enslavers could legally treat enslaved African Americans any way they wanted to.C. There was a steadier supply of enslaved Africans than there was of indentured servants.D. All answers are correct. ________ is a meditative procedure that is especially useful in controlling discomfort related to cancer. A sequence has a common ratio of Three-halves and f(5) = 81. Which explicit formula represents the sequence?f(x) = 24(Three-halves) Superscript x minus 1f(x) = 16(Three-halves) Superscript x minus 1f(x) = 24(Three-halves) Superscript xf(x) = 16(Three-halves) Superscript x who is micheal jackson? A phone company charges $25.00 a month for 500 minutes.Every minute over 500 cost $0.75. If a customer uses 530minutes how much will their monthly bill amount to? a(-3)=5 What will a equal The profit P in dollars, gained by selling x computers is modeled by p = -5x+1000x+5000. How many computers must be sold to obtain a profit of 55,000,00 What is the purpose of the following sentence?I think it would be best to study the problem carefully.O A. It raises a question.O B. It makes a statement.O C. It shows strong emotion.O D. It gives a command. 11. A box with a mass of 1.0 kg is resting on a horizontal surface and the coefficient of friction between the block and the surface is 0.20. It is accelerated by attaching a 1.5 kg mass, as shown in the diagram. Assume that the pulley is frictionless and that the cord has negligible mass. a. What is the acceleration of the box? What is the tension? First, Hannah focuses on ways to model the _____, the layer of skin upon which estheticians are licensed to work. 3. Choose the sentence with the correct usage. (1 Point) In order to adopt to the climate, we had to adopt a different style of clothing. In order to adapt to the climate, we had to adapt a different style of clothing. In order to adapt to the climate, we had to adopt a different style of clothing. In order to adapt to the climate, we had to adapt a different style of clothing.