Fill in the missing word in this program. class TooWide(Exception): pass answer = input('How wide is it? ') width = float(answer) try: if width > 30: raise TooWide else: print("Have a nice trip!") -------TooWide: print("Your luggage will not fit in the overhead bin.")

Answers

Answer 1

Answer:

Replace ______ with except

Explanation:

Your program is an illustration to try except in Python

When the Python interpreter sees a try statement, it expects a corresponding an except statement

So, the complete program is:

class TooWide(Exception): pass

answer = input('How wide is it? ')

width = float(answer)

try:

     if width > 30:

           raise TooWide

     else:

           print("Have a nice trip!")

except TooWide:

     print("Your luggage will not fit in the overhead bin.")

Answer 2

Answer:

except

Explanation:

took test


Related Questions

____ means saving data in computer memory.

Answers

Answer: Storage

Explanation:

Storage means means saving data in computer memory. Memory refers to the location which is meant for short-term data, while storage is the part of the computer system that allows an individual to store and also access data on long-term basis.

It should be noted that typically, storage usually comes in form of a hard drive or a solid-state drive.

What type of program can you use to enter your java program?a) compiler.b) editor.c) spreadsheet.d) database.

Answers

Answer:

Editor

Explanation:

A compiler translates languages

A spreadsheet is a document in which data is arranged in columns and rows

A database is a structured set of data held in a computer

An editor allows you to, well, edit code

Hope this helps!

(Please mark Brainliest!)

__________ is the most refined and restrictive service model. a) IaaS b) CaaS c) PaaS

Answers

Answer:

c) PaaS

Explanation:

Refined and restrictive service model allows the user to use full package of application stack as demand by the service. It should be noted that "PaaS" is the most refined and restrictive service model.

Platform as a Service known as (PaaS ) is computing platform that gives room for the user in the cloud to manage applications.

PaaS helps to overcome the problem in managing the complexity of software licence. Example of PaaS are window Azure,Apache Stratos.

Write a recursive function that receives an array of integers and a position as parameters and returns the count of odd numbers in the array. Let each recursive call consider the next integer in the array.

Answers

Answer:

The following are the description of the recursive method:

public int recursive(int[] x1, int position) //defining a method recursive  

{

   if(position<x1.length) //defining if block that checks position value is less then array length

   {

       if(x1[position]%2==0) //defining if block that checks in array there is even number  

       {

           return 1+recursive(x1, position+1); //use return keyword to call method by incremnent value  

       }

       else//defining else block

       {

           return recursive(x1, position+1);//use return keyword to call method and add 1 in position value

       }

   }

   else//defining else block

   {

       return 0;//return value 0

   }

}

Explanation:

In the given code, a recursive method is declared, that accepts two integer variable "x1 and position", in which "x1" is an array variable, that pass in the function parameter.

In the method, the if block is used that checks the position values is less then array length. Inside this another, if block is used, that checks in the array there is an even number.

In the condition is true, it will call the method by adding the 1. otherwise, go to the else block, in this, it will call the method and add 1 in position variable.  

if the above condition is false, it will go to else block and return a value, that is "0".  

What are some common options to sort a Mail Merge Recipient list?​

Answers

Answer:

Create and save the main document.

On the Mailings tab, in the Start Mail Merge group, choose Select Recipients→Type a New List.

Click the Customize Columns button.

Select a field that you do not need.

Click the Delete button.

Click Yes in the confirmation dialog box.

Explanation:

Hope it is helpful for you

please follow me and mark me as a brainest

Answer:

a Safe Recipients list or a postmark

Explanation:

Next
Digital sound recordings capture sound waves and divide them into distinct segments. Each segment is assigned a value. What is
that value called

Answers

Answer:

sampling height

Explanation:

Digital sound recordings capture sound waves and divide them into distinct segments. Each segment is assigned a value. The value is sampling height.

What are sound waves?

Sound waves are defined as the pattern of disruption brought on by sound energy leaving the sound source.

It is also defined as a mechanical wave that develops as a result of the medium's particles vibrating back and forth when the sound wave travels through it.

Sound waves are produced by these vibrations and travel through materials including wood, water, and the air.

The medium's particles move when an object vibrates, as well. Sound waves are the name for this motion, which continues until the particles run out of power.

Thus, digital sound recordings capture sound waves and divide them into distinct segments. Each segment is assigned a value. The value is sampling height.

To learn more about sound waves, refer to the link below:

https://brainly.com/question/21995826

#SPJ2

Which of the following are provided by most
professional organizations? Check all of the boxes
that apply.
uniforms
a code of conduct
legal representation
a network of professionals
skills validation

Answers

Answer:

B D E mark brain

Explanation:

i got a 100 on the whole lesson

Answer:

2. A code of conduct.

4. A network of professionals.

5. Skills validation.

Explanation: This is the correct answer on Edge 2021, just did the assignment. Hope this helps ^-^.

Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party software application?
A. Sandboxing
B. Encryption
C. Code signing
D. Fuzzing

Answers

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

You modify a document that is saved on your computer. Where are the changes stored until you save the document?a. Radom access memory RAMb. Read-only memory (ROM)c. Compact disc (CD)d. Universal serial bus (USB)

Answers

Answer:

a. Radom Access Memory (RAM).

Explanation:

If a computer user modifies a document that is saved on his or her computer. This changes are stored on the Radom Access Memory (RAM) until the computer user save the document.

Radom Access Memory (RAM) can be defined as the main memory of a computer system which allow users to store commands and data temporarily.

Generally, the Radom Access Memory (RAM) is a volatile memory and as such can only retain data temporarily.

All software applications temporarily stores and retrieves data from a Radom Access Memory (RAM) in computer, this is to ensure that informations are quickly accessible, therefore it supports read and write of files.

The changes made when a document is modified before saving is stored on; A: Random Access Memory(RAM)

Radom Access Memory (RAM) can be defined as the short term memory of a computer system which makes it to handle all tasks and applications.

Thus means that RAM is a kind of temporary storage that will go off when you shut down the computer. Thus, it is the memory that is required for saving active changes you make before saving.

Read more about Random Access Memory at; https://brainly.com/question/86807

Fifty part-time students were asked how many courses they were taking this term. The (incomplete) results are shown below. Need answers for part B and C

Answers

Answer:

The answer for B is 10% and for C is 40%.

Explanation:

To get the percentage for B you take the the frequecy of students taking 2 courses (5) and multiply it by 100 then you divide it by whole number of students.

For C you do the after adding the number of students taking 1 or 2 courses (20).

Consider the partition problem: given n positive integers, partition them into two disjoint subsets with the same sum of their elements. (Of course, the problem does not always have a solution.) Design an exhaustive-search algorithm for this problem. Try to minimize the number of subsets the algorithm needs to generate.

Answers

Answer:

Please see below

Explanation:

The relevant algorithm has been attached as images herein as part a and part b. There are 2 important steps in solving this query.

First, you need to acquire a sum value of the array. For an odd sum, the output will come out as false since there cannot be 2 subsets whose sums are equivalent to each other.

Second, in case of an even sum, acquire sum divided by two and locate a subset of the array that has an equivalent sum to this (use recursion or dynamic programming).

For this assignment, you will first prompt the user and read in two numbers from them. You need to check and make sure that both numbers are equal to or greater than 0 (can use an if or if/else statement for this). If so, multiply the two numbers together and print the new value to the screen.
If the user enters a number lower than 0, remind the user that they need to enter a number greater than or equal to 0 and exit the program.
Sample Runs
Sample Program Run (user input is underlined)
Please type in two numbers: 100 250
100 * 250 = 25000
Exiting program.
Please type in two numbers: -1 27
Please only enter numbers >= 0.
Exiting program.
(Here's an alternative way to do the same thing:)
Please type in one number: 100
Please type in a second number: 250
100 * 250 = 25000
Exiting program.
Please type in one number: -1
Please type in a second number: 27
Please only enter numbers >= 0.
Exiting program.

Answers

Answer:

number1 = int(input("Please type in one number: "))

number2 = int(input("Please type in a second number: "))

if number1 >=0 and number2 >=0:

   print(str(number1) + " * " + str(number2) + " = " + str(number1 * number2))

else:

   print("Please only enter numbers >= 0.")

print("Exiting program.")

Using a Loop:

while True:

   number1 = int(input("Please type in one number: "))

   number2 = int(input("Please type in a second number: "))

   if number1 >=0 and number2 >=0:

       print(str(number1) + " * " + str(number2) + " = " + str(number1 * number2))

       print("Exiting program.")

   else:

       print("Please only enter numbers >= 0.")

       print("Exiting program.")

       break

Explanation:

*The code is in Python.

Ask the user to enter two numbers

Check if they are both greater than or equal to 0. If they are, print their multiplication. Otherwise, print the remainder message

Print a message says "exiting program"

Note: Since I was not sure if the program keeps going until the user enters a negative value, I wrote two versions of the program. The one that uses the loop continues until the user enters a negative value.

which criteria can cuboids/frame selectors be coloured by​

Answers

Answer:

Label

Rider attribute

Parked attribute

Reverse Light attribute

Indicator Status attribute

Brake Light attribute

Vehicle Towing attribute

Cuboid ID

Any Lights attribute

Bottom Z

Occlusion attribute

Steps for assessing the tabs dialog box

Answers

Answer:

A dialog box what that

Explanation:

sorry 1 c3 your times 5

Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?A) Web site. B) E-mail. C) Social media.D) Offline media.

Answers

Answer:

C) Social media

Explanation:

Social media is a vital marketing tool in the modern era. Aside from posting photos or status updates, using social media for customer service can elevate your business to the next level. Social media has strong potential to better address customer service issues. And if you address and resolve customer concerns over social media in short enough time, the exchange can help you create a loyal customer base.

Learning new skills will not help you become a better digital artist: True or false?

Answers

Answer:

false, it'll help a lot

Answer:

false

Explanation:

For an activity with more than one immediate predecessor activity, which of the following is used to compute its earliest finish (EF) time? a. the largest EF among the immediate predecessors b. the average EF among the immediate predecessors c. the largest LF among the immediate predecessors d. the difference in EF among the immediate predecessors

Answers

Answer:

The correct option is A

Explanation:

In project management, earliest finish time for activity A refers to the earliest start time for succeeding activities such as B and C to start.

Assume that activities A and B comes before C, the earliest finish time for C can be arrived at by computing the earliest start-finish (critical path) of the activity with the largest EF.

That is, if two activities (A and B) come before activity C, one can estimate how long it's going to take to complete activity C if ones knows how long activity B will take (being the activity with the largest earliest finish time).

Cheers!

The option that will be used to compute its earliest finish time is A. the largest EF among the immediate predecessors.

The earliest finish time simply means the possible earliest times when an individual can be able to complete an assigned activity or project.

For an activity with more than one immediate predecessor activity, to compute its earliest finish time will be the largest EF among the immediate predecessors.

Read related link on:

https://brainly.com/question/17453686

How to represent derived attributes in database?

Answers

Answer:

Derived attribute can be defined as a type of attribute where its value will be derived from one or more of the other attributes of the same entity set.

Explanation:

An example of derived attribute is when we have an entity set called General. The set then has attributes like [Form], [Characteristics], [Address}, (Employment No).

(Employment No) which is represented distinctly in the attribute set can be called a derived attribute if it can be derived from one or more of the other attributes.

Derived attribute can be gotten through calculating values and not storing values.

For example, let us consider the following record of Teachers records;

(‘Teacher Number’, ‘Name’, ’Date of Birth’, Age today)

(‘E105’, ‘Samson’, ’07-Dec-1990’, 0)

This record shows that the teacher Samson was born on 7th of December, 1990. At the time of record insertion, he was born and 0 years old. What will be the value of his age on ’07-Dec-2000’? It is about 10 years. It clearly shows that the value is not fixed and it is a variable whenever the DOB is adjusted.

Therefore, we are not creating our table with derived attributes in it. Instead, the values ofderived attributes can be calculated at the time of retrieval and shown to the user. Hence, the record will look like as follows;

(‘E105’, ‘Samson’, ’07-Dec-1990’)

This means that 0 is a derived attribute from the Date of birth.

Angelina, the outgoing student body president, has finished a report about the upcoming school election. She wants to add a border to her report. First, Angelina navigates to the Design tab and then to the

Answers

Answer:

✅ Page background

✅ Page Borders

✅ Color

Explanation:

EDGE 2022

First, Angelina should navigate to the Design tab of the Word document and then to the Page background.

What is Microsoft Word?

Microsoft Word refers to a word-processing software application that is designed and developed by Microsoft Inc., so as to avail its end users an ability to type, format, adjust and save text-based documents.

In this scenario, Angelina can adjust the presentation of her Word document as follows:

Angelina should first, navigate to the Design tab of the Word document and then to the Page background.Next, she should click on the Page Borders.Finally, she should choose the style, width, and color of the border.

Read more on Microsoft Word here: https://brainly.com/question/25813601

#SPJ2

Write a program that allows two players to play a game of tic-tac-toe. Use a two dimensional char array with three rows and three columns as the game board. Each element of the array should be initialized with an asterisk (*). The program should run a loop that - Displays the contents of the board array - Allows player 1 to select a location on the board for an X. The program should ask the user to enter the row and column number. - Allows player 2 to select a location on the board for an O. The program should ask the user to enter the row and column number. - Determines whether a player has won, or a tie has occurred. If a player has won, the program should declare that player the winner and end. If a tie has occurred, the program should say so and end. Player 1 wins when there are three Xs in a row on the game board. The Xs can appear in a row, in a column, or diagonally across the board. A tie occurs when all of the locations on the board are full, but there is no winner.
You need to code programing challange question 18 (Tic Tac Toe Game) from Chapter 7 and add following feature in it.
1. Add two playing options. That is player can play with other player or with computer.
2. Add difficulty level (Easy, Medium and Hard) when playing against computer.
3. You should store the history of game results in a file and whenever game start you should load the history from the file.
4. Your game should present following menu.

Game Menu

1. Play
2. Game Results
3. Quit

If user select 1 then following menu should be shown

1. Play with Computer
2. Play with Other Player
3. Go Back

If user selects 3 then you should go back and display previous menu screen.
If user selects 1 the show following menu

Please select difficulty
1. Easy
2. Medium
3. Hard
4. Go Back

When user selects the desired difficulty then you should take the username (first and last name) from the user start the game
and user should be able to play with computer. Keep in mind in Easy difficulty level player should be able to easily beat the
computer where as in hard difficulty it should be very difficult for player to win.
Once game has been finished store the result in a file (You can give whatever name you want to) in following format

Name, Opponent Name, Winner, Date

For example if Majid Ali played game against computer with medium level and he wins then file should contain record as following

Majid Ali, Computer, Majid Ali, Medium, 22-August-2020

For example if Majid Ali played game against Hamza Abbas and Hamza wins then file should contain record as following

Majid Ali, Hamza Abbas, Hamza Abbas, None, 20-August-2020

When user selects 'Game Results' from the main menu then all the contents you saved in the file should be display to the screen in following format

Player 1 Player2 Winner Level Date
================================================
Majid Ali Computer Majid Ali Medium 22-August-2020
Majid Ali Hamza Abbas Hamza Abbas None 22-August-2020

Please do proper input validation at each level.

Answers

Answer:

Explanation:

i think it is easy:

1- you declare 2d array

2- fill it with *

3- declare player1Turn =true

4- declare player2Turn =false

5- make while loop where not finished

BS:not Finished would be function return bool that checks the condtions

6-if player1Turn

6.1- player1Turn =false

6.2- player2Turn =true

6.3- call function called play with "player1","X" as args

6-else if player2Turn

6.1- player2Turn =false

6.2- player1Turn =true

6.3- call function called play with "player2","O" as args

5- end while loop

What is the output for the following code? Enter the result in the blank.

>>> num = "abcdefghi"

>>> num[2:5]

Answers

Answer:

Cde

Explanation:

Because if you look at abcdefghi, In programming you start with 0. So it would be a:0 b:1 c:2 d:3 e:4 f:5 g:6 h:7 i:8. So if you say 2:5, it would be from c to e. Because in programming you dont count the last letter which is 5 you use the letter right before 5 to end it. Sorry its a bit confusing. But im 100% sure its right.

Answer:cde

Explanation:this is the correction on odyssey!!

What term describes the statements that a programmer writes in a high-level language?

Answers

Answer:

A compiler is a computer program that translates a program written in a high-level language to the machine language of a computer. The high-level program is referred to as 'the source code.

50 pts. please help ! Explain briefly the role, responsibilities, and required background of the production designer of a film.

Answers

Answer:

Production Designers are responsible for creating and managing the visual aspects of a film, television or theatre production. They work closely with the Director and Producer to create the design style for aspects such as sets, graphics, props, lighting and costumes.

Explanation:

Answer:

The production designer makes sure the film looks good. They are professionally responsible to oversee its visuals. They should know the setting, characters, and time period. They make parts of the film based on the visual aspects. Years of experience regarding film should back them up so that they can manage the movie. They work with the director and producer as well. A style is be portrayed through costumes, lighting, props, sets, etc.

Explanation:

edg2021

I wrote this, change wording

A network that has locations in different countries is considered a WAN.
a. Trueb. False

Answers

Answer:

True.

Explanation:

Wide area network (WAN) can be defined as a telecommunication network that covers a wide range of geographical locations such as countries or regions across the world for the purpose of communication and sharing information and data between different users.

Hence, a network that has locations in different countries is considered a wide area network (WAN).

Generally, wide area network (WAN) makes it possible for various organizations to interconnect with their branch offices, headquarters and other multiple locations across the globe. Wide area network (WAN) usually span over a distance of 50 kilometers.

What are the features that can extend record acees beyong Organization-wide defaults?A. Criteria-based sharing rules.B. Owner-based sharing rules.C. Public or private groups.D. Dynamic role hierarchy.

Answers

Answer: Criteria based sharing rules; Owner-based sharing rules.

Explanation:

The features that can extend record access beyond Organization-wide default are Criteria-based sharing rules and Owner-based sharing rules.

An owner-based sharing rule gives access to the records that certain users own. An example is when the sales manager for a company sees the opportunities that are owned by the sales managers in different locations. For the criteria-based sharing rule, it is not based on the record owners but rather on the record values.

Which of the following is true of public methods?
A) They can only be accessed by methods in the same package
B) They can only be accessed by methods in the same class
C) They can only be accessed by methods in a different package
D) They can be accessed by any method in the same program

Answers

Answer:

D) They can be accessed by any method in the same program

Explanation:

Public methods is a form of access modifier in a programming language such as Java, Phython, C#. However, unlike other types of access modifiers like Private Methods, Protected Methods etc they do not put any form of restriction on the access. Hence, in Public Methods members, methods and classes can be accessed from anywhere.

Therefore, what is true of Public Methods is that, they can be accessed by any method in the same program

One of the simplest hashing algorithms involves dividing the primary key field by a particular ____.

Answers

Answer:

Prime number

Explanation:

Hashing algorithm is a computer engineering term that describes a function that develops or transforms an inputs data value into a fixed-size length numeric value output. The output string is typically smaller in comparison with the input data.

However, one of the simplest hashing algorithms involves dividing the primary key field by a particular Prime Number. This is because there is a high tendency of avoiding a crash while also acquiring a distinct output.

Hence, the correct answer is PRIME NUMBER.

In addition to talking to other doctors remotely, telegraphy technology?

Answers

Answer:

Option A

Explanation:

it lets the doctors to talk to their patients about their concerns and the doctor will try to help them or make a diagnosis using the information given by the patient.

No one should self diagnose using the internet.

sometimes in order to confirm their diagnosis the doctor will require you to take certain tests,thus telehealth does not eliminate the need to visit the doctor.

Answer:

allows patients and doctors to talk online.

What is the first step you would take to create a table of authorities?
A. Open the table of authorities dialog box and select text.
B. Select the category before positioning the cursor on the page.
C. Mark citations before opening the Insert Table of Authorities dialog box.
D. Select text and open the Table of Authorities dialog box.

Answers

Answer:

C. Mark citations before opening the Insert Table of Authorities dialog box

Answer:c

Explanation:

Why would an administrator want to use the MAP Toolkit? Which tasks, other than the ones performed in this exercise, can administrators use the MAP TOOLKIT TO PERFORM?

Answers

Answer:

The MAP TOOLKIT is used to inventory the Microsoft computer devices in a network to check its readiness for upgrade and for mapping the utilisation of computer servers.

Explanation:

The Microsoft Assessment and Planning toolkit plays a vital role in the work of an IT administrator as it is automatic in inventory the users, devices and applications used in a computer network. It creates a mysql database as a default setup and is used to locate and upgrade servers in a network by analysing it's utilisation in the network.

Other Questions
Which of these sentences uses correct punctuation? Write the equation of a line that is parallel to y = 1/2 x + 5that passes through the point (2,6). A teacher raised a total of $135 for school supplies. He divides the money evenly among his 10 students. why is Rapid population growth called community health problem please help me 3. [tex] - \sqrt{49} [/tex]find each square root A homeowner considered having a new garage built and talked about the project with a contractor. In April, while the homeowner was on vacation, the contractor began building the garage according to the man's specifications. Work was complete by the end of May. In June, the homeowner returned from vacation and refused to pay for the garage. The contractor decided to file a mechanic's lien in July. Is the contractor entitled to a lien? When the percentage change in quantity demanded is numerically less than the percentage change in price, ceteris paribus, demand is: After independence, the Philippines struggled under the dictatorship of Please help! I will mark brainliest. Sketch the following graphs in order: HELP Why did Paul Revere and William Dawes ride toward Lexington and Concord on the night of April 18, 1775? They were warning the British that the Americans were coming to take their gunpowder. They were warning the town that the British were coming to attack. They were warning the British that the Americans were coming to attack. They were warning the town that the British were coming to take their gunpowder. what is the national flower for pakistan? Write an equation in slope intercept form that is parallel to y = 3x + 4 and goes through the point (-1,5) can a poem be a riddle usually a poem is to explain someone love or feeling for an object a hobby or a person but can a poem be a riddle? A hummingbird beats its wings up and down 60 times a second what is the frequency and period vienna earns $53 per week working part time at a bookstore. She makes $1 more for each book that she sells. The amount, A (in dollars), that vienna earns in a week if she sells b books is given by the following function. A(b)=53+bhow much does Vienna earn in a week if she sells 35 books? What is the distance from M(-1, 6) to N(11, 1)?Please show all work and not just the answers. Write 3.24 x 10-4 in standard notation. Explain why Native Americans were so diverse in 1491 Question 7Which sentence from the passage BEST explains why Clark doesn't think his Aunt would like to attend theorchestra?AIndeed, for her own sake, I could only wish her taste for such things quite dead, and the longstruggle mercifully ended at last.BI suggested our visiting the Conservatory and the Common before lunch, but she seemedaltogether too timid to wish to venture out.She was further troubled because she had neglected to tell her daughter about the freshlyopened kit of mackerel in the cellar, that would spoil if it were not used directly...DI was perplexed as to what measure of musical comprehension was left to her, to her whohad heard nothing but the singing of gospel hymns in Methodist services at the square frameschool-house on Section Thirteen. Which statement accurately describes the atoms of a specific element.