Scrie un program care citind varstele a 2 copii afiseaza care dintre ei este cel mai mare si cu cat. Exemplu: Pentru varstele 5 si 9 se va afisa "al doilea copil e mai mare cu 4 ani"

Answers

Answer 1

Answer:

primul_copil = int(input("Introduceți vârsta primului copil: "))

aldoilea_copil = int(input("Introduceți vârsta celui de-al doilea copil: "))

def copilmai_mare(varsta1, varsta2):

   if varsta1 > varsta2:

       diferenta = varsta1 - varsta2

       print("copilul mai mare este varsta1 cu diferența de vârstă de: ", diferenta )

   else:

       diferenta = varsta2 - varsta1

       print("copilul mai mare este varsta2 cu diferența de vârstă de: ", diferenta )

copilmai_mare(primul_copil, aldoilea_copil)

Explanation:

Programul python de mai sus definește o funcție "copilmai_mare" care ia două argumente "varsta1" și "varsta2". Diferența dintre vârstele copiilor este comparată, iar cel mai mare copil și diferența sunt tipărite pe ecran.


Related Questions

Using the Caesar cipher, "HELLO" is encrypted to "OLSSV" by applying a shift of 7. The number 7 is considered the __________

Answers

Answer:

The offset

Explanation:

In the question, we understand that the original text is HELLO and the encrypted text is OLSSV.

It should be noted that O replaced H, L replaced E, S replaced L and V replacement O.

This is made possible by a term refered to as offset.

The offset is used to determine the character that will replace another when it is encrypted.

7 characters after H is O; this is same for every other characters in the text.

The example given represents a simple shift cipher encryption with each letter in the original text shifted by a fixed value. Hence, the shift value of 7 used in the cipher given is called the key.

Each alphabet on the original text, HELLO is shifted by the key 7 to produce :

H + 7 alphabets gives OE + 7 alphabets gives LL + 7 alphabets gives SL + 7 alphabets gives SO + 7 alphabets gives V

This produces the encryption OLSSV, hence, with the shift of 7 known the encryption letters are each reversed by 7 to obtain the actual phrase 'HELLO'.

LEARN more :https://brainly.com/question/20504501

a person is riding a bike and accelerating at 2.8 m/5 2 eith a force of 100 n

Answers

Given,

Force acting on the rider = 100 N

Acceleration = 2.8 m/s²

To find,

The mass of the rider.

Solution,

Let m is the mass of the rider. Using Newton second law of motion as follows :

F = ma

[tex]m=\dfrac{F}{a}\\\\m=\dfrac{100}{2.8}\\\\=35.71\ kg[/tex]

So, the mass of the rider is 35.71 kg.

plz help Complete the sentence.
Evaluating the user's experience happens as part of the__________ phase of software development.

Answers

Answer:

Release

Explanation:

Evaluating the user's experience happens as part of the Release phase of software development.

What is a software developer do?

The foundation systems that run the machines or control subnetworks by software developers, as are the computer apps that let users perform particular activities.

To find issues and understand how the software functions, software quality assurance analysts and testers create and carry out software tests.

Thus, it is Release.

For more details about software development, click here:

https://brainly.com/question/1410106

#SPJ5

What is the use of consonant in QBASIC ? Answer me in short and easy answer.​

Answers

Answer:

See Explanation

Explanation:

I'll assume the question is about the use of constants in QBasic because consonants do not have any special function or usage in QBasic.

In simple terms: In QBasic, constants are used to represent elements that do not change in value during program execution.

Take for instance, you intend to use [tex]\pi[/tex] in your program.

Its value is [tex]\pi = 3.142[/tex]

So, 3.142 will always be a constant in your program. One of the ways it can be used in a program is:

10 LET PI = 3.142

The above represents a numeric constant. QBasic also have string constants.

Due to a blackout, power is no longer coming from the wall outlet, and your computer is now off. You do not have a UPS, and you need to remove a disc out of the DVD drive. What is the easiest method for retrieving the disc

Answers

Answer: b. Push an unbent paper clip into the hole on the front of the drive.

Explanation:

Computer DVD drives come with a hole in front of them that is not too much larger than a pin's diameter. It is called an Emergency Eject Hole.

If you find that you need to retrieve a disk and the computer is off, find an unbent paper clip and push it into that hole. The DVD drive should open up thus enabling you to retrieve your disk.

Write an algorithm and draw flowchart to print 30 terms in the following sequence
1,-2,3,-4,5,-6,7,-8,...........................upto 30 terms.

Answers

Answer:

9,-10,11,-12,13,-14,15,-16,17,-18,19,-20,21,-22,23,-24,25,-26,

27,-28,29,-30

Explanation:

It comes as positive and then as a negative number and continues in the same format.

Hope it helps....

Answer:

Explanation:

9,-10,11,-12,13,-14,15,-16,17,-18,19,-20,21,-22,23,-24,25,-26,

27,-28,29,-30

Rachel, a database administrator, has created a database for her website. It contains pictures of vacations that people have uploaded. In the database, pictures have associated information about who uploaded them and the date. What is this an example of?

Answers

Answer:

maybe it is about hotel review. or trip review like to know which country or site is mostly visited.

which task should happen during the planning stage of a project

A. reflect on the project outcome
B. prevent set backs
C. determine budget
D. reschedule to account for project update ​

Answers

Answer:

c

Explanation:

the planning stages is one of the first stages of a project. this means that you would be determining parts of the project not revising or recounting. You also reflect on projects after they are completed

Answer:

prevent set-backs

Explanation:

some others can be project initiation, project planning,  project execution, project monitoring and control, and project closure.  Hope it helps you! If it does it would be appreciated to be marked brainliest

8.
A customer wants to use the computer only to send emails to family members. Is a fast processor
required? Why or why not?

Answers

Answer:

yes

Explanation:

the faster the processor the better the computer loads things and works faster, there's little to no latency depending on the wifi

A customer wants to use the computer only to send emails to family members. Is the required the fast processor as well as fast internet connection was to send the easily.

What is customer?

The term customer refers to the purchased the goods and the services, The customer are to fulfill the needs and the wants as the exchange of the money. The customer is the receiving the information of the product with the help of customer.

The term email refers to the part of the communication. The email are the medium of the communication as the mostly used to the marketing and the information purposes. The email are the official purposes are the used. A person was to send the email to the family was the need to the fast processor as well as the need of the internet to share the email are quickly delivered.

As a result, the email was to share the quickly with the help of the internet and the fast processor.

Learn more about on email, here:

https://brainly.com/question/14666241

#SPJ2

20 points: What is the sound mix?

the addition of any

A sound that does not

originate on screen but is added for
effect
B. the gradual and smooth transition from one shape or expression to another
the type of computer editing that allows dragging and dropping clips of video or
audio, with changes and effects being easy to apply
C.the process of adding all the sound elements into one piece with the right
volume and balance

2. With the changing of mouth shapes, no other parts of the face will move or show
expression during speech.
True
False

3. The W & Q phoneme causes the most pursed mouth shape, almost closed, with
sometimes just a tad of the lower teeth visible.
True
False

What type of artist records sounds in sync with the activity on the screen using
props in a studio?

creative artist
Foley artist
destructive artist
phoneme artist

What type of mic has a very directional pickup pattern that records just what it is
pointed at, filtering out all background noise and is sometimes known as a shotgun
mic?

preferential mic
super- or hyper-cardioid mic
front-end mic
omnidirectional mic

Answers

B because it just right

Which blue line indicates that the library panel will be added to the adjustments panel group?
BRAIN OO
BRAIN

Answers

there is no image here

Can you help me with these AP Computer Science Questions. (THIS IS DUE BY 1:30 PM today) you have to evaluate the Boolean Expressions.

Answers

Answer + Explanation:

'and' -> both statements are 'True' to evaluate as 'True'.

'or' -> at least one statement is 'True' to evaluate as 'True'.

1. True (grade has the value of 82, so the statement evaluates to 'True').

2. True (Both statements are true, this expression evaluates to 'True').

3. False (Both statements are false, this expression evaluates to 'False').

4. True (the != operator means not equal. Since the 'name' variable holds the string 'Rumpelstiltskin', name != 'Rumpelstiltskin' evaluates to 'False'. The 'not' operator returns the opposite of the given Boolean expression, so this expression evaluates to 'True').

5. True (name == 'Rumpelstiltskin' evaluates to 'True', so this expression is true).

6. False (All statements evaluate to 'False').

7. True (All statements evaluate to 'True').

8. False (All statements evaluate to 'True' except for not(x == - 3) which evaluates to 'False', so the whole statement now becomes false).

9. True (grade+5 < 90 and grade >= 80 evaluates to 'True', so this whole expression becomes true).

10. True (grade > 0 and x % 2 == 1 evaluates to 'True')

Hope this helps :)

In this exercise we have to have knowledge about computation, in this way it will be possible to analyze the code in python. So we will have:

1) True

2) True

3) False

4) True

5) True

6) False

7) True

8) False

9) True

10)False

In this way to understand the code we have to make clear an important point, that is:

'and' -> both statements are 'True' to evaluate as 'True'. 'or' -> at least one statement is 'True' to evaluate as 'True'.

1) The grade has the advantage of 82, so the charge evaluates to 'True'.

2) Both charge exist valid, this facial appearance evaluates to 'True'.

3) Both account of finances happen dishonest, this facial appearance evaluates to 'False'.

4)The 'not' manipulator returns the opposite of the likely Boolean verbalization, so this facial appearance evaluates to 'True'.

5) The name == 'Rumpelstiltskin' evaluates to 'True', so this facial appearance exist real.

6) All account of finances judge to 'False'.

7) All assertion judge to 'True'.

8) All account of finances judge to 'True' except that not(x == - 3) that evaluates to 'False', so all affidavit immediately enhance dishonest.

9) The grade+5 < 90 and grade >= 80 evaluates to 'True', so this whole verbalization enhance real.

10) The grade > 0 and x % 2 == 1 evaluates to 'True'.

See more about computation at brainly.com/question/26104476

Discussion topic. The internet has transformed the way that large and small organizations conduct business. Discuss how the internet helps small businesses to complete with large organizations

Answers

Answer:

Internet now-s-days are helping compete the small businesses wit the large organizations to conduct businesses.

Explanation:

Internet in modern days have helped the small business to run as much as it has helped the big organization. Internet has become a business tool for all. Both small and large business take the opportunity of the internet to explore and expand their business.

Small business can take the help of internet and recruit new talents by posting online ads for their organization at a much cheaper price when compared to the large organizations.

Small business with the help of internet can trade online, They can buy raw materials and also sell their products online across borders. Internet promotes free trade.

E-commerce business are become more famous day by day. Small firms can set up e-commerce business and open up sites very conveniently and at a low price when compared to the large businesses.

When Mark completed his research paper, he decided that he wanted to have all headings to be in bold, underlined, and 14 points. Which keyboard combination could he use to make these changes at once?

Answers

CTRL/CMD + B (BOLD)

CTRL/CMD + U (Underline)

CTRL/CMD + ] or [ (change font size)

Write a program to input a number and check whether it is divisible by 5 or not​

Answers

Answer:#include<stdio.h>

void main()

{

        int a;

        clrscr();

        printf ("Enter the no.");

        scanf("%d",&a);

        if(a%5==0)

         {

            printf("No.is Divisible by 5");

         }

        else

        {

              printf("No is not Divisible by 5");

        }

              getch();

}

how please help me computer​

Answers

Answer:

Whaaaaaaaaaaatttttttttttttttt the

Explanation:

Write a formula, without using named ranges, that would be entered in cell E11. The formula must be easy to replicate. It should display the name of the airport, using the Airport code from cell D11 and the list of Airport names.

Answers

No you freaking suckkkkk

first answer get brainiest

Answers

Answer:

This is my best solution

SOMEONE PLEASE HELP ME OUT WITH THIS!!!!!!

Answers

Answer:

C.

Explanation:

Answer:

I think its C give branliest to other guy

how can you apply multimedia for study explain​

Answers

Answer:

This is my opinion. :-)

Explanation:

In education, multimedia applications are used as a source of information to deliver learning resources for students. Multimedia applications also used to improve the learning process and increase the interaction between students and teachers or lecturers.

SOMEONE PLEASE HELP ME FAST PLEASE PLEASE !!!!

Answers

Answer:

what

Explanation:

i don't know this oustion ?

Write a method called removeHighPrice that will go through a provided ArrayList called prices and removes the first price that is more than $5.00 and return the new ArrayList. If a price over $5 is not found, it returns the original ArrayList.

Answers

Answer:

The method written in Java is as follows:

public static ArrayList<Double> removeHighPrice (ArrayList<Double> prices){

       for(int i =0;i<prices.size();i++){

     if(prices.get(i) > 5.00){

         prices.remove(i);  

         break;

     }

 }

 return(prices);  

 }

Explanation:

This line declares the method

public static ArrayList<Double> removeHighPrice (ArrayList<Double> prices){

This line iterates through the ArrayList named prices

       for(int i =0;i<prices.size();i++){

This checks if current price is greater than 5

     if(prices.get(i) > 5.00){

If yes, the price is removed

         prices.remove(i);  

And the loop is terminated

         break;

     }

 }

This returns the ArrayList

 return(prices);  

 }

I've added as an attachment, the complete program which includes the main method

inserting merge fields in the letter
steps required
plz ​

Answers

Answer:

Click or tap where you want the merge field.

Choose the down-arrow under Insert Merge Field, and select a field.

Insert Merge Field menu of available fields

If you don’t see your field name in the list, choose Insert Merge Field.

Choose Database Fields to see the list of fields that are in your data source.

Choose Insert.

Answer:

Once you have a data source connected to your document, adding merge fields is a way to personalize a document with information from the data source. The merge fields come from the column headings in the data source.

WindowsmacOS

Here’s an example of how the Address Block and Greeting Line collections of merge fields might pull data from an Excel spreadsheet into a form letter.

Data pulled into mail merge fields

The Address Block and Greeting Line fields are collections of merge fields.

Note: If the merge field commands appears dimmed, click Select Recipients and choose the kind of mailing list you’re using. If you don’t have a mailing list yet, click Type New List to create your list in Word.

Explanation:

Hope it's answer you plz mark as Brainlist

Does magnetic tape require a laser to read data?

Answers

Answer:

No the magnetic tape requires a tape drive mechanism

Explanation:

The data in magnetic tape consists of information that has been digitized into discrete numbers by means of of a recording device which can also be able to read the recorded data on the tapes

As the magnetized tape passes under a current carrying conductor, the data on the magnetized surface can be sensed

Due to the arrangement of the magnetic tapes in their stored format, the process of retrieving information makes use of serial access such that information retrieval is slow.

The table button is present in the ……… tab.​

Answers

Answer:

Insert

Explanation:

The table button is present in the Insert tab.​

Refer to screenshot (MS Word)

Insert → Table → Insert Table or Draw Table

edhesive code practice 6.3

Answers

Answer:

Question 1

1 / 1 pts

For Questions 1-4 below, use the following image of a coordinate plane.

The coordinate (0, 0) on this coordinate plane is located at point:

 B

Question 2

The coordinate (6, 4) on this coordinate plane is located at point

 C

Question 3

1 / 1 pts

The coordinate (2, 8) on this coordinate plane is located at point:

 A

Question 4

1 / 1 pts

The coordinate (8, 2) on this coordinate plane is located at point:

 D

Question 5

1 / 1 pts

The ____________ keyword is used to create a function.

 def

Question 6

1 / 1 pts

The create_frame function creates the frame that holds the drawing.

Explanation:hope it helps

When looking at aggregated logs, you are seeing a large percentage of Windows hosts connecting to an Internet Protocol (IP) address outside the network in a foreign country. Why might this be worth investigating more closely

Answers

Answer:

"It might demonstrate a malware infection" is the correct response.

Explanation:

Because once glancing at aggregate data log files, clients could perhaps actually listen to road conditions but instead correlation coefficient.  For obvious reasons, whenever you see a significant portion of presenters designed to connect to something like a particular destination out beyond your channel, it might have been worthwhile to investigate quite tightly, although it might demonstrate malware.

Please help in Java!! Due tonight!!! Greatly appreciated!!

Answers

Answer:

d. Mystery2

Explanation:

static methods can be called without an object instance.

The getDouble() method uses ints, so pass in an int.

Who Find the exact web server that hosted the website by looking in a huge database of internet addresses

Answers

Answer:

The Internet service provider (ISP)

Explanation:

The internet service provider provides individuals and other companies access to the internet and other web services. The internet service provider looks through a huge database of internet addresses to find the exact web server that a website is hosted on when a query is sent.

Some people use the term _____ to refer to the case that contains and protects the motherboard, internal hard drive, memory, and other electronic components of the computer from damage.

Answers

Answer:

System unit.

Explanation:

Some people use the term system unit to refer to the case that contains and protects the motherboard, internal hard drive, memory, and other electronic components of the computer from damage.

A system unit also referred to as chassis or tower can be defined as a hardware case that is typically used as a protective case for the main component or primary devices such as power supply, random access memory (RAM), graphics card, CD-ROM drive, Harddisk drive, motherboard, internal cables, central processing unit (CPU) that makes up a computer system.

Basically, the main purpose of a system unit is to properly house the main components of a computer, serve as an electrical insulator and to prevent them from any form of damage.

Other Questions
what is 500 divided by 10 A template of a Venn diagram representing common and differentiating characteristics of covalent and ionic bonds is shown.Which of the following characteristics can be written only in space B?Occurs in substances that have at least one non-metalOccurs in substances that have a repeating lattice structureOccurs in substances that have discrete molecular structureOccurs in substances that have high melting points PLS HELP WILL GIVE BRANLIEST Ten percent of the items produced by a machine are defective. Suppose that twenty items are randomly chosen. Use this information to answer the following three questions. What is the probability that exactly 3 of the items are defective :sobs: help, Im giving away all my points for this. PLEASE HELP ME 15 POINTS ILL HIVE BRAINIESTjacks mom purchased a savings bond for jack. the value of the savings bond increases by 5% each year. one year after it was purchased, the value of the savings bond was $210. find the value of the bond when jacks mom purchased it. HIV is NOT transmitted through which of the following?Group of answer choicesPublic toilets and sinksBlood transfusionsUse of contaminated needlesOrgan transplant "This must be the wood," she said thoughtfully to herself, "where things have no names. I wonder what'll become of MY name when I go in? I shouldn't like to lose it at all . . . . She was rambling on in this way when she reached the wood: it looked very cool and shady. "Well, at any rate it's a great comfort," she said as she stepped under the trees, "after being so hot, to get into the into WHAT?" . . . . She stood silent for a minute, thinking: then she suddenly began again. "Then it really HAS happened, after all! And now, who am I?" Through the Looking Glass, Lewis CarrollWhich detail is stated explicitly in the passage? Alice has reached the wood.Alice is afraid of the wood.Alice cannot find the wood. Alice has lost her name. umm zuritrase899this my new acc for my back upp umm yeeumm whats +4,000 / 28,573,199 Which are LIKE TERMS in the example being shown?10 and 5x23x2 and x-3x and -43x2 and 5x2 The spiral spring showed are identical. Each spring has a spring constant K =100N/m determine the total extension caused by the 150N weight help me out really quickis 18/28 passing?thx again f(x)=25-x2, find the value of f(3) In parallelogram BCDE if CE= 32 find GFPlease help Ill give brainliest The pressure on a 200-milliliter sample of CO2(g) at constant temperature is increased from 60 kPa to 120 kPa. What is the new volume of the gas? Thomas Jefferson believed that all men were born with certain rights that could not be taken away. Which phrase did Jefferson write to explain these rights? "For imposing Taxes on us without our Consent" "Congress shall make no law respecting an establishment of religion" "among these are Life, Liberty, and the pursuit of happiness" "the right of the people to keep and bear Arms, shall not be infringed" why did Onoda and his men think General Tomoyuki Yamashia's leaflet was Allied hoax PLEASE HELP URGENTLY!The ratio of red to blue counters is 1:3 how many more red counters do you need to add to make the ratio of red to blue 4:1WILL GIVE BRAINLIEST!IM GIVING EXTRA POINTS Isaac and jennifer's total cost for their business is given by C(x)= 40x + 96,000 and its revenue function is represented by R(x)= 60x. A. Set up the cost revenue and function Please answer quickly!! Read the following lines from "The Human Drift and define the words in bold. Use context clues to determine the meanings1. These migratory movements of peoples have been called drifts, and the word is apposite2. Retreating before stronger breeds, hungry and voracious, the Eskimo has drifted to the inhospitable polar regions3. Perhaps most amazing has been the South Sea Drift Blind, fortuitous, precarious as no other drift has been