What does an else statement do?
A. gives an alternative to the test conditions
B. always executes
C. nothing

Answers

Answer 1

Answer:

A

Explanation:

If the first condition are not true then it executes else, but if the first condition is true then it ignores the else statement


Related Questions

Suppose that you have the following definitions:
struct time Type
struct tourType
{
int hr;
double min;
int sec;
string cityName;
int distance;
timeType travelTime;
};
};
a. Declare a variable destination of type tourType.
b. Write C++ statements to store the following data in destination: cityName - Chicago, distance -- 550
miles, travelTime - 9 hours and 30 minutes.
c. Write the definition of a function to output the data stored in a variable of type tourType.
d. Write the definition of a value-returning function tat inputs data into a variable of type tourType.
e. Write the definition of a void function with a reference parameter of type tourType to input data in a
variable of type to tourType

Answers

Suppose that you have the following definitions:struct time Type struct tourTypen the variable destination of type your type are tourType input(){cout<<"Enter the city, distance and time in hr and min"<>destination.city name;

What is C++ statements?

Expression statements. These statements examine an expression for its aspect outcomes or for its go-back value. Null statements. These statements may be supplied in which a declaration is needed with the aid of using the C++ syntax however in which no motion is to be taken.

#include#includethe use of namespace std;struct timeType;struct tourType;tourType destination;tourType input(){cout<<"Enter the city, distance and time in hr and min"<>destination.cityName;cin>>destination.distance;cin>>destination.travelTime.hr;cin>>destination.travelTime.min;go back destination;}void display()cityName;d.distance = t->distance;d.travelTime.hr = t->travelTime.hr;d.travelTime.min = t->travelTime.min;">int main().

Read more about the variable :

https://brainly.com/question/2804470

#SPJ1

SAfe is based on four primary bodies of knowledge#

Answers

SAfe is based on four primary bodies of knowledge that are Agile improvement, Lean product improvement, structures thinking, and DevOps.

What is the number one want for SAFe?

A number one purpose for SAFe is to align improvement to in addition commercial enterprise objectives. SAFe combines learnings from validated agile methodologies to create a platform that meets the necessities for software program improvement inside big organization programs.

SAFe Full Configuration includes 4 ranges: Team, Program, Large Solution and Portfolio. It is continuously being improved, and its ultra-modern model. Fe is primarily based totally on 4 number one our bodies of knowledge: Agile improvement, Lean product improvement, structures thinking, and DevOps.

Read more about the SAfe:

https://brainly.com/question/8430576

#SPJ1

The network layer of the ISO/OSI model organize bits into ..........​

Answers

Answer:

frames

Explanation:

The data-link layer is the second layer from the bottom of the OSI Model. The data-link layer's principal role is to identify errors and merge data bits into frames.

In what ways may the WBS be used as a key document to monitor and control a project?

Answers

By bringing everyone's attention to the work that has to be done, WBS can be utilized to prevent scope creep.

What is WBS?

WBS stands for Work Breakdown Structure. It facilitates task allocation. It is much simpler to allocate work to the proper person when a project is divided into manageable tasks or packages. This assists your team in making plans for tasks that must be accomplished in addition to the job at hand.

Thus, the WBS can be used as a key document to monitor and control a project because it makes the process of quickly creating a timetable easier, By assigning work estimates to particular WBS parts, the required task is described and organized by it.

Learn more about WBS here:

https://brainly.com/question/13090633

#SPJ1

3. Which of the following is most likely fake news?
O A. Content from a website that ends in ".edu"
OB. A news site that lists all of its contributing authors
OC. An article that tries to sell you miracle weight loss pills
O D. An academic resource listed in a bibliography

Answers

Answer:

C. An article that tries to sell you miracle weight loss pills

how does the government us information system to manage traffic flow

Answers

the street lights have timers on them to change naturally, and the roads have wires underneath to feel when a car is waiting so when they feel there’s a lot of people they keep going and then time out and the other lanes get to go

What would you consider before buying a printer​

Answers

Answer:

Printing Quality, Price, If it van vonnect to my laptop or nay devices.

Answer:

to make sure it comes with ink

Explanation:

if not buy some when u purchase it

Which for loop syntax is correct?
A. for {i=0, i<10, i++}
{code block}
B. for (i=0; i<10; i++);
{code block}
C. for (i=0; i<10; i++)
{code block}

Answers

Answer:

C

Explanation:

Why is it important not to leave your personal information on a public computer?
A. Other people need a clean computer to use.
B. Someone can steal the information and hurt you.
C. It makes it hard for the next person to log in.
D. It's rude and someone else has to clean up after you

Answers

Answer:

B. Someone can steal the information and hurt you.

Explanation:

People can hack into your accounts using your informations and spread hurtful things that can make people hurt. The people will think that you posted this (even if you didn't) and blame you.

I have a .NET 6 basic website that I built using Entity Framework as the database for updating pages. I am ready to deploy the site/database to a live server somewhere, but I am looking for the best option.

The website is built using the latest .NET Framework 6.0, with Entity Framework 6.0.3. I know about HostGator, GoDaddy and InterServer.

I have read stuff online that said HostGator doesn't actually support the latest .NET 6.0, and GoDaddy only supports .NET Core 3.2?

HostGator is rougly $5.00 a month, GoDaddy is $6.00, and InterServer is $8.00.

I am leaning towards InterServer, because I have read that InterServer supports the latest .NET 6.0 and Entity Framework.

I am used to deploying to servers using LAMP stack, Linux, Apache, PHP, MySQL... The prices there are lower and it is fairly simple to setup. I figure there has to be something similar for windows and .NET.

For something similar, am I looking for Shared Hosting? Or VPS? I really don't understand what I need. I was hoping for Shared Hosting, export my SQL Server database, create it on the live server, then FTP my files over.

InterServer seems like it supports everything, so I am leaning towards that. I know no matter what, Windows Hosting is going to be a little bit more expensive. I just want something that I know is going to work with the latest .NET technologies.

Does anyone have any suggestions?

Answers

In the above scenario, i will recommend Bluehost  or InterServer since it is good and can meet your requirement.

What is Bluehost?

Bluehost is known to be a software that is said to be a little bit better than HostGator in the aspect of  security as it gives offer free SSL certificates, malware tools, and others.

Therefore, In the above scenario, I will recommend Bluehost  or InterServer since it is good and can meet your requirement.

Learn more about Bluehost from

https://brainly.com/question/17062016

#SPJ1

What federal law requires manufacturers to put care labels on their garments and fabrics sold by the yard?

Answers

CARE LABELING RULE which requires manufacturers and importers to attach care instructions to garments.

You add a filter by condition, and set the condition to [Weight]>50. How will this affect your data? in tableau

Answers

It will only show items whose weight is over 50 is the  way it will this affect data. When the computed field is utilized in the filter, only items with a weight greater than 50 are kept.

How do the person filter by condition in Tableau?

There are five steps involved in it that are given below-

In the Filter Window, go to the 'Condition' tab.Select the 'By field' radio button.From the drop-down list, choose the name of the filtered field.Choose an aggregation type from the drop-down menu, such as Sum, Average, or Median.From the drop-down menu, select the operator.

Thus, It will only show items whose weight is over 50

For more details about person filter by condition in Tableau, click here:

https://brainly.com/question/25531734

#SPJ1

Pls guys I need help fast my PC is new and it can't connect to a network

Answers

Answer:

There are several reasons why your PC might not be able to connect to Wi-Fi. You should first make sure that your PC's Wi-Fi adapter hasn't been turned off, or needs to be reset. The issue might also be with the Wi-Fi, not your PC — make sure that it works on other devices.

Answer:

Use ethernet cable, it worked for me!

Q3: What do you mean by a pointer to a pointer? Can this be extended?

Answers

Answer:

hola, te habla mi contestadora si no te contesto seguro no quiero hablar con vos

donde vas si son las 11?

todo el barrio la conoce

Explanation:

le gusta sentirse mala, tiene un tubo en la Sala

para tumbar el club

kiere quedarse dentro del party

será cuestión de tiempo?

conosco tu debilidad

What is the optimal number of members for an Agile team?

Answers

5 or 6 people

Explanation:

Second, for those of you who demand a prefer an answer upfront, here it is – the optimal number of members for an agile team is 5 or 6 people. That is 5 or 6 team members and excludes roles like Scrum Master, Product Owner, and God forbid, Project Manager.

Create a defined name for range b6:e6 using walkup as the range name

Answers

In order to create a defined name for the range, one must follow the steps below.

What are the steps to creating a named range?

Step 1 - Select the concerned range (Rows and columns inclusive of the labels)Step 2 - From the Ribbon above, select Formulas. Then select "Create From Selection".From the "Create From Selection" dialogue box, select the option that is indicative of the location of your row / column.Click "Ok".

Learn more about Named Range at:
https://brainly.com/question/13396823
#SPJ1

Build python

Prompt the user for the length,width and height of a room.


Calculate the area of the floor. (length*width)


Calculate the volume of the room. (length*width*height)


Display the area and volume to the user.


Open a file named “roomdata.txt”.


Write the area and volume to the file.

Answers

Answer:

You'd have to create a "roomdata.txt" file before writing to it.

Explanation:

#Python Geometry

lenght = int(input("Enter lenght: "))

width = int(input("Enter width: "))

height = int(input("Enter height: "))

def floor_area(area);

area = 0

area = lenght * width

return area

def room_volume(vol);

vol = 0

vol = lenght * width * height

return vol

print ("Area of floor = ", floor_area, "/n Volume of room = ", room_volume)

f = open ("roomdata.text", "w")

f.write("Area of floor = ", floor_area, "/n Volume of room = ", room_volume)

f.close()

If you want to load the "my-data.csv" file to Dataframe so that you can explore find out the number of data items in the data set, how should you import the required library?

1.import numpy as dataframe

2.import pandas as pd

3.import seaborn as pd

4.import matplotlib.pyplot as pd​

Answers

If a person want to load the "my-data.csv" file to Dataframe one can use import pandas as pd.

What is pandas?

Pandas is known to be a tools that carry out data transformations. It often helps to filter and analyze any kind of data.

Note that for import one can use:

import numpy as np. import pandas as pd.

Therefore, If a person want to load the "my-data.csv" file to Dataframe one can use import pandas as pd.

Hence, the second(2) option is correct.

Learn more about Dataframe  from

https://brainly.com/question/25525005

#SPJ1

How can MS Word aid healthcare professionals with virtual communication?

Answers

MS Word aid healthcare professionals with virtual communication by the Handled properly, phrase processing promises massive benefits: stepped forward collections, improved coins flow, decreased paperwork, and improved donations to healthcare foundations.

What do nurses use Microsoft Word for?

Personnel control data (demographic and expert information of nursing staff), Resource control/evaluation monitoring for reviews on budgeting DRGs, time beyond regulation usage, affected person care hours, deliver gadget projections, and staffing hours, and.

The Microsoft Office System, coupled with accessories supplied via way of means of partners, promises a portal answer that may offer clinicians and researchers immediate get admission to to the data they need, which includes the present-day scientific magazine articles, drug reference data and affected person handouts.

Read more about the word:

https://brainly.com/question/190029

#SPJ1

Question2.
What are the functions of information technology?

Answers

Answer:

I) infrastructure

ii) communication

iii) introduces and maintains computerized systems to process data efficiency , etc

What’s the main purpose of a personality test?

Answers

Answer:

Which of following is not anelectroyte

Personality tests are designed to systematically elicit information about a person's motivations, preferences, interests, emotional make-up, and style of interacting with people and situations.

What are the predominant means by which individuals enter the InfoSec profession?

Answers

InfoSec is a profession with little personnel turnover.

Give the value of the zero flag, the carry flag, the signflag, and the overflow flag after each of the following instructions if AX is initialized with 0x1254 and BX is initialize dwith 0x0FFF.

a. add ax, 0xEDAB

b. add ax, bx

c. add bx, 0xF001

Answers

The correct answer is A for this question

Add ax, 0xEDAB is the value of the zero flag, the carry flag, the sign flag, and the overflow flag after each of the following instructions if AX is initialized with 0x1254 and BX is initialize dwith 0x0FFF

What is sign flag?

Sign flag is defined as whether the outcome of an arithmetic operation is positive or negative is indicated by a bit in a status byte in the central processing unit of a computer. Architecture determines the size and significance of the flag bits. It often includes data regarding current constraints on CPU operation as well as the outcome of arithmetic operations.

After any operation, the sign flag (S) is set to 1, indicating that the number is negative, if the MSB (B(7)) of the result is 1. Zero Flag (Z): If the outcome of any mathematical or logical operation is 0 (00)H, the zero flag (Z) is set, or 1, otherwise it is reset, or 0.

Thus, add ax, 0xEDAB is the value of the zero flag, the carry flag, the sign flag, and the overflow flag after each of the following instructions if AX is initialized with 0x1254 and BX is initialize dwith 0x0FFF

To learn more about sign flag, refer to the link below:

https://brainly.com/question/12974452

#SPJ2

write an algorithm to find the area of a circle of radius r

Answers

Answer:

e=mc^2

Explanation:

Select the items below that are a computer
Pocket Watch
Server
Calculator
Piano
Laptop
Tablet

Answers

Answer:

Laptop is the answer.. .....

What is the process of ensuring that corporate security policies are carried out
consistently?

Answers

Policy or security and only conscious

Ensuring consistent adherence to corporate security policies involves a systematic approach to implementation and monitoring.

Ask about the process of ensuring that corporate security policies are carried out consistently.

Here are some steps that can be taken to ensure policies are carried out consistently:

1. Policy Development:

Establish clear and comprehensive security policies that cover various aspects such as data protection, access controls, network security, and employee guidelines.

2. Communication and Training:

Effectively communicate the policies to all employees, ensuring they understand their roles and responsibilities in maintaining security.

3. Documentation and Accessibility:

Document the policies in an easily accessible format, such as an employee handbook or an intranet portal. Regularly update and maintain the documentation to reflect any changes or new requirements.

4. Compliance Monitoring:

Implement a monitoring system to track compliance with security policies. This can include conducting internal audits, vulnerability assessments, and security awareness campaigns.

5. Incident Response and Reporting:

Establish a clear process for reporting security incidents or violations. Encourage employees to report any suspicious activity promptly.

To learn more about the security policies visit:

https://brainly.com/question/13169523

#SPJ3

To stay safe and avoid malware programs you should (choose 3)
a. run updates to your computers operating system
b. turn off your computer
c. install antivirus software and run regular updates and scans
d. click on any antivirus software ads that you see on the internet
d. avoid suspicious-looking ads or downloads when on the internet
f. install every virus software

Answers

Answer:

I would say choose,

A -  run updates to your computers operating system

C - install antivirus software and run regular updates and scans

D - avoid suspicious-looking ads or downloads when on the internet

Identify the cost of non-compliance. What will happen to the organization if they fail to meet compliance?

Answers

The costs of non-compliance are:

FinespenaltiesBusiness disruption.Revenue loss.Productivity loss.

What will happen to a firm is non-compliance?

Non-compliance is one that makes a firm or company to loose millions of dollars in terms of  financial losses, there is also security breaches, license band, business disruptions, and others.

Therefore, The costs of non-compliance are:

FinespenaltiesBusiness disruption.Revenue loss.Productivity loss.

Learn more about  non-compliance from

https://brainly.com/question/17306620

#SPJ1

a ___ is a type of computer that is small and portable?

Answers

Answer:

laptop

Explanation:

laptops are small and they can be taken anywhere.

of
tion
TCP/IP was developed in the 1960s to enable university scientists to locate other computers on the Internet.
Select one:
O True
O False

Answers

Answer:

True

Explanation:

Other Questions
Simplify the expression by combining liketerms: Algebra 1 Hershey and Chase labelled phages with 32P and 35S. They found that the S35 labelled protein remained outside the cell and could be removed without affecting the phage infection. 32P labelled DNA entered the bacterial cells and could be found in progeny phages. Could this experiment have been performed using radioactively labelled hydrogen and carbon? Find how many numbers between 23^2 and 25^2. . A gracious welcome by an employee at the hotel check-in counter is an example of: a. social sustainability. b. predictive analytics. c. a service blueprint. d. a moment of truth. What is the median of the data? Muzan Killed Tanjiro's family because of fear of Yoriichi and the most powerful breathing technique, Sun Breathing. That if he did not kill the kamado family they would use their sun breathing and kill muzan. But in this case Tanjiro and Nezuko survived and will later kill Muzan in the Manga, I think. Dilate the figure by the scale factor. Then enter the new coordinates.K= 3 Which set of values could be the side lengths of a 30-60-90 triangle? If you vertically stretch the exponential function f(x)=2^x by a factor of 3 what is the equation of the new function f) 234x +(234x) (x0) PLEASE HELP :)Nelson Mandela's role in South African politics changed after the end ofapartheid because:A. he was elected to office as the most powerful political leader inSouth Africa.B. he increasingly argued that white citizens should be forced toleave South Africa entirely.C. he shifted from being a supporter of Desmond Tutu to being oneof his fiercest rivals.D. he began to believe that communism could end South Africa'seconomic problems. A forest fire burns down most of the trees in a large forest. The animals that live in the trees are forced to move to other areas. What kind of disturbance is this? A. Cyclical B. Small C. Primary D. Secondary 2Na+SNa2S What is the total number of moles of S that react when 4.0 moles of Na were completely consumed? Read the passage from Sugar Changed the World.On a plantation there were large groups of workersbetween fifty and several hundred. The mill was right next to the crop, so that growing and grinding took place in the same spot. And all the work was governed by extremely tight, rigid discipline. The Muslims began to put together the rules for this new kind of farming. Both they and the Christians experimented with using their slaves to run the plantations. At first many of the slaves working sugar plantations in the Mediterranean were Russians, or anyone captured in war. But even all this careful organization did not solve the second problem with sugar.What evidence from the passage best supports the inference that making sugar was difficult? Select two options."growing and grinding took place in the same spot""the work was governed by extremely tight, rigid discipline""Muslims began to put together the rules for this new kind of farming""experimented with using their slaves to run the plantations"many of the slaves working sugar plantations in the Mediterranean were Russians"careful organization did not solve the second problem with sugar" Some insects look like plants in their environments. The walking stick is one example of this kind of insect. It looks exactly like a twig. Another insect that looks like a plant is the katydid. The katydid looks just like a green leaf on a tree. It even moves slowly, so it looks like a leaf swaying in the wind.Which concluding statement also adds a little punch for interest? A. Camouflage is an amazing thing. B. Some insects look just like plants. C. These insects are true masters of disguise. D. These insects use a special kind of camouflage. Review the role of two archaeologists whose work is discussed in this chapter. What specific contribution did they provide to the recovery, reconstruction, and interpretation of the artifacts from the prehistoric Aegean? Conduct research to find at least one other historical society whose "material culture" was discovered in a similar manner. Cite your source. The table below shows the amount of money spent on skin diving and scuba equipment in some recent years.Skin Diving and Scuba EquipmentYearSales ($millions)199331519943221995328199634019983451999363Let x represent the year and y represent the amount of sales, in millions of dollars, in the regression equation.y = 7.36 x minus 14,354.33,Use the regression equation to predict the sales of skin diving and scuba equipment in the year 2008.a.44,000,000b.440,000,000c.42,455,000d.424,550,000Please select the best answer from the choices providedABCDMark this and return Palo DuroSome places simply warrant more attention. One of the most illustrious sites in the world is known by very few except regular adventure-goers.Travelers are awed by Palo Duro Canyon as its deep, red landscape appears seemingly out of nowhere. The canyon, similar in length to the GrandCanyon in Arizona, has scenic views just as glorious as those of the more famous canyon. At night, coyotes can be heard in the distance as the highwinds gust through the valley, echoing the howls off the steep canyon walls. During the day, the hateful sun heats up every visible crevice, providing acontrast to the cool, breezy nights. The favorable aspect of the day is its gift of sight, of the stunning erosion that has taken place over millions ofyears, or of the rocks impossibly balanced on one another and their relentless determination to remain unmoved. This place and its striking diversitydeserve recognition for doing exactly what nature does best: providing wonder to all.2Select the correct answer.Which detail is emphasized in the text but not in the image?OA steep canyon wallsOB. high winds in the valleyOC. millions of years of erosionOD. the deep, red landscape What are the vowels? Which statement best describes the change of tone in the final paragraph?The tone is more admiring as the author confirms that the Berlin tunnel was the most important part of the Cold War.The tone is frightened as the author begins to share details of the Cold War that followed.The tone is more reflective as the author connects the Berlin tunnel to the Cold War that followed.The tone is humorous as the author connects the Berlin tunnel to a propaganda frenzy.