Using Python Write an expression using Boolean operators that prints "Special number" if special_num is -99, 0, or 44.

Sample output with input: 17
Not special number

Answers

Answer 1

special_num = int(input())

if special_num == -99 or special_num == 0 or special_num == 44:

   print("Special number")

else:

   print("Not special number")

I wrote the code so that the user enters a number of their choice. Best of luck.


Related Questions

You have just purchased a new USB drive that you want to use to troubleshoot the computers in your company as well as other network devices, such as printers and projectors. You need to format this new drive with a file system that will be recognized and used on all devices new and old.
When formatting your USB drive, which of the following file system types would meet MOST, if not all, of your needs?
CDFS
NTFS
NFS
FAT32

Answers

Answer:

Fat32

Explanation:

Fat32 is a universal format supported on almost every Operating System (Even WIN95 )

You have n warehouses and n shops. At each warehouse, a truck is loaded with enough goods to supply one shop. There are m roads, each going from a warehouse to a shop, and driving along the ith road takes d i hours, where d i is an integer. Design a polynomial time algorithm to send the trucks to the shops, minimising the time until all shops are supplied.

Answers

Following are the steps of the polynomial-time algorithm:

Split the routes according to their categorizationAssuming that mid = di of the middle road, low = road with the least di, and high = road with the highest di, we may do a binary search on the sorted list.All shops must be approachable only using these roads for every road, from low to mid.Check if all shops can be reached from\(\bold{ low \ to\ mid+1}\) using only these roads.There is a solution if every shop can be reached by road only up to \(\bold{mid+1}\), but not up to mid.You can \(\bold{set \ low = mid+1}\) if all businesses aren't accessible using both \(\bold{mid\ and\ mid+1}\) roads.If every shop could be reached using both mid and mid+1, then set high to mid-1.With these layouts of businesses and roads, no response can be given because \(\bold{ low > high}\)You can do this by \(\bold{set\ mid = \frac{(low + high)}{2}}\)The new low, mid, and high numbers are used in step (a).

In a minimum amount of time, this algorithm will determine the best strategy to supply all shops.

Learn more:

polynomial-time algorithm: brainly.com/question/20261998

what to write about technology?​

Answers

Answer:

Lt is the moreen way or machine that helps life to be simple and easy

Aside from the malicious link, there are also several other indicators on the email that shows it is likely a phishing email. Can you identify anything else that looks suspicious in the email?

Aside from the malicious link, there are also several other indicators on the email that shows it is

Answers

Answer:

The senders email domain.

Explanation:

The senders email address is from a different email domain than the receivers email domain. The senders has a hyphen whereas the recipients does not.

7. In order to check your following distance, use a fixed object and count seconds.
True
False

Answers

Answer:

False

Explanation:

It is true that distance can be checked by counting seconds from a fixed object

How to determine the true statement?

The given highlights are:

Using a fixed objectCounting seconds

When seconds from a fixed object (such as a pole) are counted, the quantity that is being measured is time.

The time recorded can be used along the average speed to determine the distance traveled.

Hence, the given statement is true

Read more about distance and time at

https://brainly.com/question/4931057

#SPJ2

visual basic is an example of...

Answers

Answer:

Basic Programming language

Users are unable to open files that are not relevant to their jobs. Users can open and view files but are unable to edit them. Users can open, view, and edit files. The bullet points above describe _____. Responses access privileges firewalls network topologies modems

Answers

Answer:

Explanation:

them

Rewrite the following pseudocode to include two more scores, 99 and 87. start num myScores[10] = 78,95,84,92,88,85,94,89,97,82 num counter = 0 num highest = 0 while counter < 10 if myScores[counter] > highest then highest = myScores[counter] endif counter = counter + 1 endwhile output highest stop

Answers

Here's the rewritten pseudocode with the additional scores:

start
num myScores[12] = 78,95,84,92,88,85,94,89,97,82,99,87
num counter = 0
num highest = 0
while counter < 12
if myScores[counter] > highest then
highest = myScores[counter]
endif
counter = counter + 1
endwhile
output highest
stop

00111110 – 10110110 – 01001100 – 01111010 –00101111 – 01011001 to hex decimal

Answers

The hexadecimal value of 00111110 – 10110110 – 01001100 – 01111010 –00101111 – 01011001 is: 3EB64C7A2F59.

What is a hexadecimal system?

Hexadecimal is a base-16 numeral system. It is useful for representing huge integers with fewer digits.

There are 16 symbols or potential digit values in this system, ranging from 0 to 9, followed by six alphabetic characters: A, B, C, D, E, and F.

Learn more about hexadecimals:
https://brainly.com/question/11293449
#SPJ1

There are 12 inches in a foot and 3 feet in a yard. Create a class named InchConversion. Its main() method accepts a value in inches from a user at the keyboard, and in turn passes the entered value to two methods. One converts the value from inches to feet, and the other converts the same value from inches to yards. Each method displays the results with appropriate explanation.

Answers

Answer:

import java.util.Scanner;

public class InchConversion

{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

   

 System.out.print("Enter inches: ");

 double inches = input.nextDouble();

 

 inchesToFeet(inches);

 inchesToYards(inches);

}

public static void inchesToFeet(double inches){

    double feet = inches / 12;

    System.out.println(inches + " inches = " + feet + " feet");

}

public static void inchesToYards(double inches){

    double yards = inches / 36;

    System.out.println(inches + " inches = " + yards + " yards");

}

}

Explanation:

In the inchesToFeet() method that takes one parameter, inches:

Convert the inches to feet using the conversion rate, divide inches by 12

Print the feet

In the inchesToYards() method that takes one parameter, inches:

Convert the inches to yards using the conversion rate, divide inches by 36

Print the yards

In the main:

Ask the user to enter the inches

Call the inchesToFeet() and inchesToYards() methods passing the inches as parameter for each method

Explain the following IT terms Network Administrator: Network Architect: Network Security Analyst: Networking Certifications: Soft Skills: Parliamentary procedure: Information security: Malware: DoS Attack: Phishing: Internal Threats: explain all pls

Answers

Answer:

A network administrator is in charge of installing, maintaining, and upgrading any software or hardware needed to keep a computer network running smoothly.

Security methods to protect data, networks, and computer systems are designed, planned, and implemented by a network security analyst. They're also in charge of keeping data safe and avoiding service outages.

Network certifications are certificates you can get to show you have the knowledge and skills to work with networks in the IT profession.

Soft skills are characteristics that personality has and enable people to communicate with one another and succeed at work.

Parliamentary procedure is a set of ethics rules and practices that govern operations and meetings of clubs, deliberative assemblies , legislative bodies, and organizations.

Information security is an activity that prevents unauthorized access and disclosure, and the destruction of data.

Malware is software designed to damage or destroy computers and computer systems.

A denial-of-service attack attempts to halt a network, rendering it inaccessible to its intended users.

Phishing is a common social engineering attack to obtain sensitive information from individuals, such as usernames, passwords, and payment card numbers.

Internal threat is malicious action perpetrated against an organization by people who have legitimate access to the network, apps, or databases.

Explanation:

Answer:

A network administrator is in charge of installing, maintaining, and upgrading any software or hardware needed to keep a computer network running smoothly.

Security methods to protect data, networks, and computer systems are designed, planned, and implemented by a network security analyst. They're also in charge of keeping data safe and avoiding service outages.

Network certifications are certificates you can get to show you have the knowledge and skills to work with networks in the IT profession.

Soft skills are characteristics that personality has and enable people to communicate with one another and succeed at work.

Parliamentary procedure is a set of ethics rules and practices that govern operations and meetings of clubs, deliberative assemblies , legislative bodies, and organizations.

Explanation:

How do you run an executable file in a particular operating system? The user has to type the of the executable file at the command prompt of the operating system.

Answers

1. Answer: Type "cmd"

2. Click Command Prompt

3. Type cd [filepath]

4. Hit Enter

5. Type start [filename.exe]

6. Hit Enter

Explanation:

That is how it is done in Windows 10.

For a quick analysis of the individual amenities, you will add Sparklines.

In cell range H5:H11, add Column Sparklines that chart the advertising expense by amenity type over the months January to June.
Apply the style Dark Blue Sparkline Style Accent 5, Darker 50%.

Answers

To add Column Sparklines in Excel and apply the style Dark Blue Sparkline Style Accent 5, Darker 50%, you can follow these steps below.

What is the Sparklines?

The steps are:

Select the cell range H5:H11 where you want to add the Column Sparklines.Go to the "Insert" tab in the Excel ribbon.Click on the "Column Sparklines" button in the "Sparklines" group.In the "Create Sparklines" dialog box, select the range of data that corresponds to the advertising expense by amenity type over the months January to June.Choose "Column" as the Sparkline type and click "OK".The Column Sparklines will be added to each cell in the selected range.To apply the Dark Blue Sparkline Style Accent 5, Darker 50% to the Column Sparklines, select all the sparklines.Go to the "Design" tab in the Excel ribbon.

Lastly, In the "Sparkline Styles" group, select the style "Dark Blue, Sparkline Style Accent 5, Darker 50%". The style will be applied to all the sparklines in the selected range.

Learn more about Sparklines from

https://brainly.com/question/29832130

#SPJ1

If you want to filter data and create new data set for a specific use case audience which analytics feature can be use

Answers

The analytics feature to use are segmentation, custom metrics, data visualization

The different analytic features for data

There are several analytics features that can be used to filter data and create a new data set for a specific use case audience.

Segmentation: This feature allows you to group your data by specific characteristics, such as demographics or behavior, to create targeted subsets of your data.

Filtering: This feature enables you to select specific data points based on certain criteria, such as date range, geographical location, or user type.

Custom Metrics: This feature lets you create new metrics based on existing data, allowing you to extract more meaningful insights from your data set.

Data Visualization: This feature allows you to present your data in a visual format, making it easier to understand and analyze.

Read more about data at: https://brainly.com/question/26711803

#SPJ1

what is a computer ?​

Answers

Answer:

A computer is a machine that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming. Modern computers have the ability to follow generalized sets of operations, called programs. These programs enable computers to perform an extremely wide range of tasks.

Explanation:


Well.......

A computer is a machine that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming. Modern computers have the ability to follow generalized sets of operations, called programs. These programs enable computers to perform an extraordinary wide range of tasks.










According to Wikipedia ;))

You can use the Cut and Paste commands to move files from one location to another.
er:
a O True
b O False

Answers

Answer:

true

Explanation:

Lucy wants to develop a web page to display her profile. She wants to start with a basic page that list her accomplishments, her work history and the different computer courses she has taken. She would like each section to be clearly identified. what type of list would work best for lucy's accomplishments?

Answers

Answer:

An unordered list.

Software Security Integration involves which attributes? Select the correct option(s) and click submit. Estimation of Software Security Efforts & Software Security Budget Requirements Estimation of Software Security Efforts & Sign Off Criteria Definition Software Security Budget Requirements & Sign Off Criteria Definition Software Security Effort Estimation and Budget Requirements, Identification of teams to perform reviews & Defining Sign Off Criteria Submit​

Answers

Software Security Integration concerns which attributes to Estimation of Software Security Efforts & Software Security Budget Requirements

What is software security requirements?

A security requirement is a statement of needed security functionality that provides one of many different security properties of software is being satisfied. Security requirements are emanated from industry standards, applicable laws, and a history of past exposures.

What is software safety courses?

The types of security software for business websites contain computer antivirus, network security, SaaS security, content control system, e-commerce software, payment gateway software, content delivery network, bot comfort, and monitoring tool.  

To learn more about  security requirement, refer

https://brainly.com/question/2818423

#SPJ9

HELP
What are glue languages?
A) coding languages
B) C++
C) Java
D) scripting languages

Answers

Answer:

First of all, A programming language known as "glue language" is created especially for managing and writing code that joins various software components.

Explanation:

The answer would be Option number "A" because it says coding languages.

please give me a crown for this pleaseee

A coding languages …

Can anyone help me in this question pls?...

Can anyone help me in this question pls?...

Answers

Your characters need to be at least

It is a system that is used to solve problems and interact with the environment

Variable
Computing System
Network
Computer

Answers

The term that encompasses asystem used to solve problems and interact with the environment is a "computing system."

Why is a computing system important?

Technology has improved to the point where computer systems are employed by every sector to  boost efficiency and remain ahead of their competition.

"A computing system is often made up of hardware components (such as computers and server  s) and software components (such as operating systems and apps) that collaborate to execute tasks, analyze data, and interface with people or other systems.

 It can include a variety ofdevices, networks, and computer resources to facilitate problem solving, data processing, communication, and other computational  operations.

Learn more about computer at:

https://brainly.com/question/29892306

#SPJ1

Help fast

When comparing and what is the main difference?
O The first symbol is for reviewing text and the second for enlarging text.
The first symbol is for spacing and the second for sizing.
O The first symbol is for viewing text and the second for inserting text.
O The first symbol is for inserting text and the second for viewing text.

Answers

Answer:

The first symbol is for inserting text and the second for viewing text

Explanation:

I am trying to write a class that asks the user to input their address. Once the address is entered the program will find all the letters “a”, “e” and “o” after cycling them through for a loop. If any of these letters exist, it will take them, store them in an array list, and print them out.

Answers

Answer:

Here is an example of how you could write a class that asks the user to input their address, and then finds and stores any instances of the letters "a", "e", and "o" in an array list:

import java.util.ArrayList;

import java.util.Scanner;

public class Address {

 public static void main(String[] args) {

   // Create a Scanner object to read input from the user

   Scanner input = new Scanner(System.in);

   // Prompt the user to enter their address

   System.out.print("Enter your address: ");

   String address = input.nextLine();

   // Create an array list to store the letters "a", "e", and "o"

   ArrayList<Character> vowels = new ArrayList<>();

   // Cycle through the address string, looking for the letters "a", "e", and "o"

   for (int i = 0; i < address.length(); i++) {

     char c = address.charAt(i);

     if (c == 'a' || c == 'e' || c == 'o') {

       // If one of the letters is found, add it to the array list

       vowels.add(c);

     }

   }

   // Print out the array list of vowels

   System.out.println("Vowels found in your address: " + vowels);

 }

}

Explanation:

This code uses a for loop to cycle through each character in the address string, and checks if it is one of the letters "a", "e", or "o". If it is, it adds the character to the array list. Finally, it prints out the array list of vowels.

I hope this helps! Let me know if you have any questions.

How can you get access to help? Check all that apply

Answers

Answer:

The answer is "F1"

Explanation:

Please find the complete question in the attachment file.

The F1 key is also known as the function key, which can be used to configure on a device or console key to cause such actions, a form of a soft button, to also be performed by a web browser control parser or software application. The main purpose of the F! key is to open the Help screen for all programs.

How can you get access to help? Check all that apply

In the _____ approach to integration through linking data collection and analysis methods, data collection and analysis link at multiple points. Group of answer choices connecting building merging embedding

Answers

Question:

In the _____ approach to integration through linking data collection and analysis methods, the two databases are brought together for analysis

Answer:

Mixed Methods Approach: connecting, building, merging, embedding

Explanation:

The mixed methods approach in research occurs when the researcher combines collection and analysis of data in one study. In other words, the researcher collects both qualitative and quantitative data(from surveys for example) and integrates and analyzes all in one study. The connecting, building, embedding and merging are methods used in the database to achieve mixed methods approach. Connecting links databases, building notes different databases in data collection, merging brings them all together for analysis, and embedding combines data collection and analysis at different points.

Pls help I will mark brainliest

Pls help I will mark brainliest

Answers

Answer:

connection-oreented

Explanation:

what they said i’m pretty sure^

What is the default join type? inner self join left outer right outer

Answers

Answer: inner

Explanation: on edg

Answer:

inner

Explanation:

just did it on Edg

I have attached 512 MB RAM for my computer. While I am checking the size of RAM after fixing, it shows as 504MB. What could be the reason for that?

Answers

When it comes to RAM, a 512 MB RAM module should typically read as 512 MB. However, sometimes the actual size of the RAM module can be slightly different. This is not always due to an issue with the RAM itself, but it can be due to several other factors. The first thing to check is to see if the RAM is seated properly. It could be that the RAM is not seated properly, which can cause a reduction in the amount of RAM that is recognized by the computer.

Sometimes the RAM can be slightly crooked or not completely inserted into the slot, which can cause a drop in the amount of RAM that is detected. It's best to take out the RAM and reinsert it to make sure that it is seated properly.Another potential cause of the issue is a BIOS limitation.

The computer's BIOS is the firmware that is responsible for managing the hardware of the computer, and it may not support a certain amount of RAM. It's best to check the computer's manual or visit the manufacturer's website to see if there are any limitations on the amount of RAM that can be installed.

Finally, it's also possible that the RAM module itself is faulty. In this case, it's best to test the RAM module by using diagnostic tools to check for any errors. If errors are found, it's best to replace the RAM module with a new one.

For more such questions on RAM, click on:

https://brainly.com/question/28483224

#SPJ8

________ is software that is needed to run and maintain the functionality of a computer and its parts.

Answers

An operating system (OS) is a piece of software that executes other applications and programs on a computer while controlling and coordinating the hardware components. It is the core component of the system software, and without it, a computer cannot operate.

What is computer ?

A computer is a device that may be configured to automatically perform series of mathematical or logical operations (computation). Modern digital computers are capable of running programmes, which are generalised sets of operations. These apps give computers the ability to carry out a variety of tasks. A computer is a minimally functional computer that contains the peripheral devices, system software (primary software), and hardware required for proper operation. This phrase may also apply to a collection of connected computers that work as a unit, such as a network or group of computers. The sole purpose of early computers was to perform computations. Since ancient times, simple manual tools like the calculator have supported humans in performing computations.

To know more about computer visit:

https://brainly.com/question/21474169

#SPJ1

: "I have a customer who is very taciturn."

: "I have a customer who is very taciturn."

Answers

The client typically communicates in a reserved or silent manner

B. He won't speak with you.

Why are some customers taciturn?

People who are taciturn communicate less and more concisely. These individuals do not value verbosity. Many of them may also be introverts, but I lack the scientific evidence to support that assertion, so I won't make any inferences or make conclusions of that nature.

The phrase itself alludes to the characteristic of reticence, of coming out as distant and uncommunicative. A taciturn individual may be bashful, naturally reserved, or snooty.

Learn more about taciturn people here:

https://brainly.com/question/30094511

#SPJ1

Other Questions
The product of twice a number and five is the same as the difference of nine times the number and 3/4. Find the difference In 35 words or fewer, what do you think it meant to be someone's patron? As an artist, why would you want to keep your patron happy? Below are the times (in days) it takes for a sample of 6 customers from Lashonda's computer store to pay their invoices.18, 44, 22, 13, 20, 27Send data to calculatorFind the standard deviation of this sample of times. Round your answer to two decimal places.ExplanationI need help with this math problem Does smartphone increase or decrease work productivityof male employee? What happens once the Insert tab is used in PowerPoint to insert a chart into a presentation?A separate data sheet opens in which to enter data for the chart.The user is prompted to link to an external Excel spreadsheetThe user can edit the chart directlyNothing happens What are the numbers to fill in this table? Use the double bar graph below to answer the following question.What was the population of San Diego in 2000?1,000,0001,200,0001,100,0002,000,000 Hailey signed up for a streaming music service that costs $12 per month. The service allows Hailey to listen to unlimited music, but if she wants to download songs for offline listening, the service charges $1 per song. How much total money would Hailey have to pay in a month in which she downloaded 15 songs? How much would she have to pay if she downloaded ss songs? Mary has been saving her weekly allowance for the past 20 weeks. She started with $100 and now has $300. Which equation can be used to find the amount of money Mary receives for her weekly allowance? Question 1 of 10Which of these questions will you ask yourself in the post-reading phase?A. What subject is the text about?B. Do I already know anything about this subject?C. Why did I want to read this text?D. Was my purpose for reading achieved?SUBMIT Explain the basic physics of a satellite orbiting a planet. Include the following words: velocity, energy, kinetic energy, gravitational energy, time of orbit, distance between the planet and satellite. One good way to improve your gas mileage is to _____. What if were are not going to use our middle finger in typing the letters E And I what do you think will happen Times interest earnedAverill Products Inc. reported the following on the companys income statement in 20Y8 and 20Y9: 20Y9 20Y8Interest expense $440,000 $400,000 Income before income tax expense 5,544,000 4,400,000 a. Determine the times interest earned ratio for 20Y8 and 20Y9. Round to one decimal place. 20Y9 20Y8Times Interest Earned fill in the blank 1fill in the blank 2b. Is the change in the times interest earned ratio favorable or unfavorable? Directions: Fill in the blanks with the numbers 0 to 9 to make an equation that has therequested amount of solutions. Equation with NO Solutions. 8x-3x+2-x = _x+_ Select the correct answer. In which form of government do delegates speak on behalf of citizens? A. Popular sovereignty B. Authoritarian C. Monarchy D. Representative E. Totalitarian. Which are examples of services provided by counties? Check all that apply. Determine if the data below represents a function. Explain your reasoning. (3, 2), (4,7), (8, 12). (10, 15) a bucket holds c liters of water but a jar holds d liters more how much water do they hold together 1/2(x + 6) = 1/2x - 9