Choose the function described.
The
function deletes all items from a list.
delete
remove
clear

Answers

Answer 1

Answer:

clear

Explanation:

Answer 2

Answer:

just did the test and the answer is c clear

Explanation:


Related Questions

Write a program that will read in id numbers and place them in an array.The array is dynamically allocated large enough to hold the number of id numbers given by the user. The program will then input an id and call a function to search for that id in the array. It will print whether the id is in the array or not.

Answers

Answer:

#include <stdio.h>

#include <stdlib.h>

int main() {

  int n, i, *p, s;

  scanf("%d", n);

  p = (int*) malloc(n * sizeof(int));

  if(p == NULL) {

     printf("\nError! memory not allocated.");

     exit(0);

  }

  printf("\nEnter elements of array : ");

  for(i = 0; i < n; ++i) {

     scanf("%d", p + i);  

  }

  scanf("Enter Id to be searched: %d", s);

  for(j = 0; j < n; ++j) {

     if (s == *(p+j)){

         printf("ID number is in the array at position %d", j);

     }else{

         printf("Error: ID number does not exist.");

     }  

  }

  return 0;

Explanation:

The C program source code inputs integer values to dynamic array size, and the search variable is looked for in the array using a for loop. If the search term exists, then the index position is printed on the screen, else an error message is displayed on the screen.

Complete the Car class by creating an attribute purchase_price (type int) and the method print_info() that outputs the car's information.
Ex:
If the input is:
2011
18000
2018
where 2011 is the car's model year, 18000 is the purchase price, and 2018 is the current year, then print_info() outputs:
Car's information:
Model year: 2011
Purchase price: 18000
Current value: 5770
Note: print_info() should use three spaces for indentation.
This is what is given
class Car:
def __init__(self):
self.model_year = 0
# TODO: Declare purchase_price attribute

self.current_value = 0

def calc_current_value(self, current_year):
depreciation_rate = 0.15
# Car depreciation formula
car_age = current_year - self.model_year
self.current_value = round(self.purchase_price * (1 - depreciation_rate) ** car_age)

# TODO: Define print_info() method to output model_year, purchase_price, and current_value

if __name__ == "__main__":
year = int(input())
price = int(input())
current_year = int(input())

my_car = Car()
my_car.model_year = year
my_car.purchase_price = price
my_car.calc_current_value(current_year)
my_car.print_info()

Answers

Answer:

Just add this and yoyr code should work.

Explanation:

def print_info(self):

      print("Car's information:")

      print("   Model year:", self.model_year)

      print("   Purchase price:", self.purchase_price)

      print("   Current value:", self.current_value)

Classes are templates used when an object is to be created while methods are functions that are executed when called or evoked

To declare the attribute purchase_price (type int), we make use of the self keyword, and we initialize the value to 0

So, the declaration of the purchase_price attribute is:        

self.purchase_price = 0

To define the print_info() method, we simply evoke the model_year and the purchase_price attributes.

So, the definition of the print_info() method is:

def print_info(self):

    print("Car's information:")

    print(" Model year:", self.model_year)

    print("Purchase price:", self.purchase_price)

Read more about class and methods at:

https://brainly.com/question/15125793

What did networks of the 1960s use to connect computers?

telephone lines

wireless technology

television signals

telegraph cables

Answers

Answer:

id say telephone lines or cables

The answer is Telephone lines

What is one advantage of using object-oriented programming?
A.
increases coding time
B.
makes debugging the code easier
C.
takes longer to plan
D.
has a longer learning curve
E.
creates single file code

Answers

I think that the answer is B

One advantage of using object-oriented programming makes debugging the code easier. The correct option is B.

What is object-oriented programming?

Programming in the object-oriented (OOP) manner identifies classes of objects that are closely related to the methods (functions) with which they are associated. It also covers the concepts of attribute and method inheritance.

Objects can be used in a variety of ways. Due to its modularity, extensibility, and reusability, object-oriented programming improves software development productivity when compared to traditional procedure-based programming techniques.

Functional programming, at its most basic, employs immutable data to instruct the program exactly what to do.

Therefore, the correct option is B. makes debugging the code easier.

To learn more about object-oriented programming, visit here:

https://brainly.com/question/11023419

#SPJ2

Put the steps you would use to insert and label an endnote in order.

Answers

Answer:

2nd- step 1, 3rd- step 2, 1st- step 3, 4th- step 4

Explanation:

1. locate the reference tab

2. click the insert endnote option

3. type your endnote label

4. type the text you want the endnote to follow

PLEASE HURRY 30 POINTS
Which of the following statements describes the way networks are set up?

LANs are made up of LANs.

WANs are made up of WANs.

LANs are made up of WANs.

WANs are made up of LANs.

Answers

Wans are made up of lans

Answer:

WANs are made you of LANs

Explanation:

What are the oop concept of java

Answers

Answer: OOP concepts in Java are the main ideas behind Java’s Object Oriented Programming. They are abstraction, encapsulation, inheritance, and polymorphism. Grasping them is key to understanding how Java works. Basically, Java OOP concepts let us create working methods and variables, then re-use all or part of them without compromising security.

HOPE THIS HELPED IS NOT SORRY.

OOP stands for Object Oriented Programming. In Java, we create classes to represent different things. For instance:

public class MyClass {

   public static void main(String args[]) {

     Car cr = new Car();

     cr.createCar("Ford", "Green", 2000);

     cr.printInfo();

   }

}

class Car{

   private String model, color;

   private int year;

   

   void createCar(String md, String cl, int yr){

       model = md;

       color = cl;

       year = yr;

   }

   void printInfo(){

       System.out.println("Car Info:");

       System.out.println("Model: "+model);

       System.out.println("Color: "+color);

       System.out.println("Year: "+year);

   }

}

We create a car object derived from the Car class with whatever properties we want and then we can display the properties of our car with the printInfo() method.

This is just one example of the OOP concept of Java.

Write a program that will input two numbers and print the larger number on the screen.

Answers

num1 = float(input("Enter the first number: "))

num2 = float(input("Enter the second number: "))

if num1 > num2:

   print(num1)

else:

   print(num2)

I hope this helps!

Which view in the View tab of the ribbon is the easiest place to add a header or a footer? Normal view Custom Views Page Layout view Page Break Preview

Answers

Answer:

Page Layout view

Explanation:

Answer:

C. Page layout view

Explanation:

What characteristics do mentally healthy people exhibit? Check all that apply.

exercise 30 minutes a day
make their own decisions
are comfortable with other people
get overwhelmed by emotions
handle problems when they arise
make the best out of every situation

Answers

Make there own decisions

Handle problems when they arise

Make the best out of every situation

Maybe, are comfortable with people, but I’m not sure.

Hope this helps!!

Answer:

make their own decisions

are comfortable with other people

handle problems when they arise

make the best out of every situation

Explanation:

Select the correct navigational path to change a chart's style in an Excel worksheet.

Answers

Select the correct navigational path to change a chart’s style in an Excel worksheet.

Select the table.

Click the  

✔ Design

tab on the ribbon and look in the  

✔ Chart Styles

group.

Select a new style from the templates available and release

Toggle the chart. The Design, Layout, and Format tabs have been added to the Chart Tools, which are displayed. Click the arrow in the Chart Elements box under the Current Selection group on the Format tab, then click the chart element you wish to alter the formatting style for.

What navigational path to change a chart's style?

Click on the chart, then press Ctrl + Shift + C to swiftly switch the type of chart you're using. By using this shortcut, you may rapidly browse between the various chart kinds to pick the one that best fits your data. 3. Click on the chart and then press Ctrl + to add a trend line to it.

Therefore, Click Move Chart in the Location group under Chart Tools on the Design tab. Choosing one of the following, Click New sheet, enter a name for the worksheet in the New sheet box, and then click the chart to transfer it to the new worksheet.

Learn more about Chart Styles here:

https://brainly.com/question/12154998

#SPJ5

Which Tab contains the font style attributes?

Answers

The home tab.

This tab contains the most-used Word features, such as tools for changing fonts and font attributes, customizing paragraphs, using styles, and finding and replacing text.

An IT security threat is anything that might cause serious harm to a computer system, including someone stealing a laptop that contains confidential information. Question 1
True
False

Answers

Answer: True

Explanation: Anything that is an IT threat is something that can compromise the integrity of the company or software and if that someone who stole a laptop has the information on it can get the information then there is a real risk that is faced to the company that owns that information.

Answer: True
Since a security threat is endangering the computer

WHAT DOES THE JEFFY SAY?

Answers

Hi and higaggahahahhaah

Answer:

Jeffy overhears Mario use the word and begins saying f. Mario scolds Jeffy and tells him to not say the word, but Jeffy resumes using it regardless.

Explanation:

Describe the Pointer with example?​

Answers

Answer:

A pointer is a variable that stores the address of another variable. Unlike other variables that hold values of a certain type, pointer holds the address of a variable. For example, an integer variable holds (or you can say stores) an integer value, however an integer pointer holds the address of a integer variable.

Answer: A pointer is a variable that stores the address of another variable. Unlike other variables that hold values of a certain type, the pointer holds the address of a variable. For example, an integer variable holds (or you can say stores) an integer value, however, an integer pointer holds the address of an integer variable.

Explanation:

Where can a user find the set of tools used for adjusting the magnification of a slide

Answers

At the top left corner 6 small spots down, you can find it. (Highlighted Orange)

( Marking me Brainlyst will help my rank <3 )

Which of the following is the strongest password?
O A. ttwEwtcaoaSm
O B. Thisismypassword
O C. 12345654321
O D. 8)oscysbydel%2

Answers

Answer:

Probably D

Explanation:

In what I have learned, I was taught that a strong password needs all of the following: Lowercase letters, Uppercase letters, Numbers, and Symbols, but the only one that has almost all of these, is D, because it has 2 numbers, 10 lowercase letters, and 1 symbol, the rest are just too obvious, (except for A)       -_-

But other than that, I hope this is right, but if it is not i am very very sorry! :(

The strongest password is ttwEwtcaoaSm. The correct option is A.

What is a password?

A password is a secret string of characters or symbols that is used to prove identity or gain access to a resource or computer system.

Passwords are used to safeguard sensitive data such as personal information, financial information, and online accounts.

A strong password is a difficult-to-guess or crack combination of letters, numbers, and symbols.

To maintain security, it is recommended that you use unique and complex passwords for each account and change them on a regular basis.

The strongest password is ttwEwtcaoaSm, which combines upper and lowercase letters, numbers, and special characters and is not a common phrase or word.

Thus, the correct option is A.

For more details regarding password, visit:

https://brainly.com/question/28114889

#SPJ7

Choose the function required to have the code have the output shown.
>> alist = [10, 23, 'bye', 4.6]
>>> aList.
vo
4.6
>>> aList
[10, 23, 'bye']
A) pop B)remove C) clear

Answers

The function that will be required to have the code with the output 4.6 and the aList will be [10, 23, 'bye'] is pop.

Code explanation:

The code is written in python.

alist = [10, 23, 'bye', 4.6]

According to the python code, we used the variable "aList" to store a list. The list has a length of 4. It contains integers, float and string.

Using the pop function, the last value of the list will be removed.

The pop function removes the last value in a list.

alist.pop() removes 4.6 and it is printed out .

Then when we ask for our list, the list is printed out without the last value(4.6).

learn more on function here: https://brainly.com/question/15782435

Answer: pop

Explanation: got it right on edgen

When it comes to cyberbullying, “power imbalance” is the term used for

Answers

Answer:

no

Explanation:

because

Answer:

intimidating someone online with threats

Explanation:

Just did the quiz on edg

08408519 kahoot code

Answers

Answer:

ill join

Explanation:

Answer:

the code 08408519 dosent work

Explanation:

what are 3 software programs for mobile computing?

Answers

Answer:

1.Communication Devices

2.Mobile hardware

3.Mobile software and apps

(smartphones, laptop, etc)

A merge field can be used multiple times in the same document.

A. True
B. False

Answers

TRUE, Yes you can you just have to redo the request for the identical information on the same spot in the same document.

please hurry

How are computers connected to one another?

through networks

through printers

through laptops

Answers

Answer:

networks

Explanation:

internet

Answer:

i know u dont need help anymore but the guy who said networks is correct

Explanation:

e

Assume you use Bubble Sort to sort a list with 15 elements (i.e.n= 9). Exactly howmany comparisons do you use (in the worst case)?

Answers

Answer:

Worst case is 55 but it really does depend on the numbers

Explanation:

1/2n squared -1

So that would be 7.5 squared -1

Execution speed of a program on a computer processor varies with the language a programmer uses to code it. Select the correct option that
compares machine language with other languages.
The execution speed of machine language is
[___] than the execution speed of other languages.

Options:

slower
no different
faster

Answers

Answer:

faster

Explanation:

i took the test

Answer:

The answer is FASTER.

Explanation:

From PLATO!

what feature is available to add a suggestion in the margin of someone else's document?​

Answers

Answer:

The correct answer to this question is given below in the explanation section.

Explanation:

The correct question is:

what feature is available to add a suggestion in the margin of someone else's document. The given features in this question are:

AnnotationCommentsHighlight and Bookmark

The correct answer to this question is the Comments.

Because you can add comments in someone else's document and only Comments features in word document allow you add comments on the someone else's document.

While the other options are not correct because:

The Annotation works with grammar or writing, Highlight feature allows you to mark important information or text in your document. while Bookmark allows you to save your space in a document.

Most IT security threats originate with hackers.
Question 3 options:
True
False

Answers

The answer is True they do originate with hackers

uses of diodes in the society​

Answers

Answer:

The application areas of diodes include communication systems as limiters, clippers, gates; computer systems as logic gates, clampers; power supply systems as rectifiers and inverters; television systems as phase detectors, limiters, clampers; radar circuits as gain control circuits, parameter amplifiers, etc.

Explanation:

Explanation:

I should understand this answer

PLEASE HURRY AND BE SERIOUS

Which of the following statements describes the way networks are set up?

LANs are made up of LANs.

WANs are made up of WANs.

LANs are made up of WANs.

WANs are made up of LANs.

Answers

Answer:  D: WANs are made up of LANs.

Explanation:

Answer:

answer is D WANS are made up of LANS

Explanation:

Define a function hyp(leg1, leg2) that returns the length of the hypotenuse of a right triangle
Hint: number**0.5 takes the square root of a number, number**2 squares a number

Answers

I've included my code in the picture below. Best of luck.

Other Questions
A 2.5 kg object has an acceleration of 4 m/s2. What is the force of the object? Please helpThank you Which subsets does 65/13 belong? Move the appropriate subsets into this box. Which word correctly describes the relationship between Ana and Rodrigo, according to this sentence? Ana es la esposa de Rodrigo. A. divorciados B. casados C. solteros D. amigos Reset Next slope is 2 and (1, 6) is on the line; point-slope form Describe the state of Rome right after the assassination of Julius Ceaser 15 POINT QUESTION; I REALLY NEED HELPA dietician gathered data about the amounts of flour, baking powder, and butter used for several different muffin recipes. She used a graphing tool to organize the data in different scatter plots and found the following lines of best fit: The relationship between the baking powder used, x, and the flour used, y, is modeled by the equation y = 0.13x + 0.92, and the correlation coefficient for the data is 0.953. The relationship between the baking powder used, x, and the butter used, y, is modeled by the equation y = 0.24x + 0.76, and the correlation coefficient for the data is 0.802. The relationship between the flour used, x, and the butter used, y, is modeled by the equation y = 0.86x + 0.52, and the correlation coefficient for the data is 0.693. Which line of best fit can the dietician expect to produce the most reliable predictions? A. the line modeling the baking powder and the butter used B. the line modeling the baking powder and the flour usedC. the line modeling the flour and the butter used D. All three lines will give equally reliable predictions. which statement best completes the diagram? Help please my parents said if I get good grades they were going to buy me a phone for Christmas please help how can i cure myself from corona (funny way) Help please, it's too hard to do on my own I tried Which of the following is true about American spirituals?Question 1 options:A. They developed during the the Civil WarB. They often contained allusions to Biblical events, figures and themesC. They contained hidden codes pertaining to finding freedomD. B and CE. None of the above2. Which line in "Go Down, Moses" most clearly states its central message?Question 2 options:A. "Go down, Moses"B. "Let my people go"C. "Thus saith the Lord"D." Oppressed so hard, they could not stand"3. Part A: What do the spirituals Go Down, Moses, Follow the Drinking Gourd and Swing Low, Sweet Chariot most clearly reveal about the slaves who originally sang them?Question 3 options:A. They accepted slavery as the way of the world.B. They were often highly educated.C. They longed for freedom.D. They sang songs.4. Part B: Which of the following lines support your answer to # 3?Question 4 options:A. For the old man is a-waiting to carry you to freedom, if you follow the drinking gourd (Follow the Drinking Gourd" 185)B. Go down, Moses, Way down in Egypt land (Go Down Moses" 187)C. I looked over Jordan and what did I see (Swing Low Sweet Chariot 188)D. The river bank will make a very good road (Follow the Drinking Gourd 185)5. How is war portrayed in both Vigil Strange I Kept on a Field One Night and A March in the Ranks Hard-Prest, and the Road Unknown?Question 5 options:A. As a glorious eventB. As brutal and uglyC. As unexplainableD. As something no one should participate in (all soldiers should stop fighting)6. Consider this excerpt from "A March in the ranks Hard-Prest and the Road Unknown": Entering but for a minute I see a sight beyond all the pictures and poems ever made,Shadows of deepest, deepest black, just lit by moving candles and lamps,And by one great pitchy torch stationary with wild red flame and clouds of smoke Based on the opening lines of A March in the Ranks Hard-Prest and the Road Unknown, what is the tone of this poem?Question 6 options:A. MournfulB. EerieC. JoyfulD. Creative7. PART A: What is the main theme, or message, of The Gettysburg Address?Question 7 options:A. It is the duty of the living to take up the cause for which the soldiers died and save the United States.B. The Civil War was a terrible war and destructive to the continuation of the United States.C. The dead soldiers should be commemorated and remembered.D. Whatever the outcome, its just good to know the war is now over.8. PART B: Which of the following quotes from The Gettysburg Address supports your answer to # 7?Question 8 options:A. Now we are engaged in a great civil war, testing whether that nation, or any nation so conceived and so dedicated, can long endure (Lincoln 184).B. But, in a larger sense, we can not dedicatewe can not consecratewe can not hallowthis ground. The brave men, living and dead, who struggled here, have consecrated it, far above our poor power to add or detract (Lincoln 184).C. It is for us the living, rather, to be dedicated here to the unfinished work which they who fought here have thus far so nobly advanced (Lincoln 184)9. In O Captain! My Captain! Walt Whitman creates an extended metaphor. Which of the following are true about this poem?Question 9 options:A. The captain represents Abraham LincolnB. The ship represents the Confederate StatesC. The port represents the end of the Civil WarD. A and CE. All of the above10. Which of following lines indicate how the speaker in the poem felt about the captain?Question 10 options:A. Here Captain! dear father!B. Exult O shores, and ring O bells! But I with mournful tread,Walk the deck my Captain lies,Fallen cold and dead.C. My father does not feel my arm, he has no pulse nor will,D. All of the above Which is a bacterial disease that spreads through the air and attacks the lungs?Hepatitis AInfluenzaStrep throatTuberculosis A poet's use of myths to help get her or his ideas across to the reader is very misleading, because the reader will logically project the characters in the myth as if they were characters in the poet's poem.A.TrueB.False Molecules are related to matter because What does the law of conservation of energy state?O A Energy can be created from nothing.OB.Energy cannot be destroyed..Energy cannot change forms.OD.The total amount of energy in a system changes continuously. What happens to a copper wire when it is moved across a magnetic field?A. Voltage and electric current are induced B. Its attracted to the positive pole of magnetic fieldC. Electric current is induced, but not voltage.D. Its attracted to negative pole of magnetic field This the code from the last post I did what is the full from of love Dan mixed 2 parts of milk and 3 parts of syrup to make a drink. How many parts of milk did Dan mix with each part of syrup? (1 point) Group of answer choices A two over five B two over three C three over five D three over two What oxidation half-reaction happens when iron reacts with tin(II) nitrate?Fe(s) + Sn(NO3)2(aq) Fe(NO3)2(aq) + Sn(s)O A. Fe2+ (aq) + 2e Fe(s)O B. Sn(s) Sn2+(aq) + 2eO C. Fe(s) Fe2+(aq) + 2eO D. Sn2+(aq) + 2e Sn(s)