Summary about Interface Design in system analysis

Answers

Answer 1

Answer:

Explanation:Systems Analysis

It is a process of collecting and interpreting facts, identifying the problems, and decomposition of a system into its components.

System analysis is conducted for the purpose of studying a system or its parts in order to identify its objectives. It is a problem solving technique that improves the system and ensures that all the components of the system work efficiently to accomplish their purpose.

Systems Design

It is a process of planning a new business system or replacing an existing system by defining its components or modules to satisfy the specific requirements. Before planning, you need to understand the old system thoroughly and determine how computers can best be used in order to operate efficiently.

System Design focuses on how to accomplish the objective of the system.

System Analysis and Design (SAD) mainly focuses on −

Systems

Processes

Technology


Related Questions

What number will be output by the console.log command on line 5

Answers

Answer:

-2

Explanation:

Which human job is most similar to the role of a producer

Answers

Answer: Directors

Explanation:  directors create motion pictures, television shows, live theater, commercials, and other performing arts productions. directors work under a lot of pressure, and many are under stress to finish their work on time.  Work hours for producers and directors can be long and irregular.

Write an interactive Java Program named HollowRightAngled Triangle.java which uses the JOptionPane class for input. The program should ask you to input a character of your choice, as well as the height/Depth of the Triangle. The character can be any character, e.g., a star, an integer, a letter of the alphabet, a $ sign, etc. When the character has been entered by the user, the program should echo using the System.out.println() output scheme, the words, "You have Entered The Character, according to the character entered. After that, the program should ask you to enter a depth/height. Once the height/depth has been entered, the pogram should then draw/output a right-angled triangle made of the chosen character .​

Answers

Here is a Java program to draw a hollow right angled triangle:

import javax.swing.JOptionPane;

public class HollowRightAngledTriangle {

public static void main(String[] args){

   String character = JOptionPane.showInputDialog(null, "Enter a character: ");

   System.out.println("You have entered the character " + character);

   String height = JOptionPane.showInputDialog(null, "Enter height: ");

   int h = Integer.parseInt(height);

   

   for (int i = 1; i <= h; i++) {

     

       for (int j = 1; j <= i; j++) {

       

           if (j == 1 || i == h || i == j){

              System.out.print(character);

           }

           else {

               System.out.print(" ");  

           }

       }

     

       System.out.println();    

   }    

}

How it works:

We use JOptionPane to promt the user for input.We store the character in the String character.We store the height in the String height and parse it to an int.We use two nested for loops.The outer loop iterates over the height.The inner loop iterates over i , the current height.We print the character if j (the inner loop counter) is 1 (first element in row)or if i is equal to h (last row) or if i equals j (last element in row).Otherwise we print a space.After the inner loop, we go to the next line.

What are two examples of ways an electronic record may be distributed to others

Answers

Explanation:

Two ways an electronic record may be distributed are e-mail or printing and publishing to others.

timeline:
At least three different historical periods in time to examine and explore in terms of art
and photography as well as our current time period (you will therefore research four time
periods in total).
• For each historical period that you choose, as well as the current time period:
• Explore and identify at least one artistic theme associated with this period
• Explore and identify at least one artistic trend associated with this period
• Explore and identify the most popular or relevant photographic styles used during this period
Explore and identify the most popular or frequently photographed subjects during this period
O
Now for the fun part! Your timeline should feature more images, graphics, and visual
components than text. While you will certainly need to include text to further explain the
images that you include and the research that you do, you want your timeline to ultimately
appear as a beautiful work of art-a visual exploration through the history of photography
neral. This timeline can be created using any program you wish, or feel free to

Answers

The timeline is a representation of a chronological sequence of events that occurred in a specific period. It is an important aspect of analyzing art and photography. Below are the three historical periods, art themes, and trends associated with the era, photographic styles, and most popular or frequently photographed subjects during the period:1.

Renaissance Period (1400-1600)Art Theme: Religious themes, classic myths, and historical events were a prominent theme.

Trend: The dominant trend during this period was the perfection of art as a skill. A focus on balance, symmetry, and realistic human features.

Photographic Style: There were no photographs at this time. The art was created by paint and other art forms.Most Popular/Frequently Photographed Subjects: People, daily life, architecture, and nature2.

Modernism Period (1900-1930)Art Theme: Experimental, abstraction, and simplification were the prominent art themes.

Trend: The dominant trend was the change of perception towards art and creative representation.

Photographic Style: During this period, photographers shifted their interest in capturing events in reality to exploring the abstract.

Most Popular/Frequently Photographed Subjects: Human faces, motion, and landscape3.

Postmodernism Period (1960-1990)Art Theme: The prominent art theme was the exploration of cultural differences and diversity.

Trend: The dominant trend was the creation of art that served as a critique to modernism.

Photographic Style: Photography became a primary source of artistic expression, and photographers created various styles.

Most Popular/Frequently Photographed Subjects: Social changes, women's rights, multiculturalism, and globalization.In conclusion, exploring the history of photography is an essential aspect of analyzing art and understanding the various artistic themes, trends, styles, and subjects that dominated each period.

For more such questions on Renaissance Period, click on:

https://brainly.com/question/879750

#SPJ8

Describe how you plan to account for the organizational roles and experience level of your audience as you prepare your presentation.
Describe how the educational level of the viewers will impact your presentation.

Answers

Answer:

Maybe by how educated you are it can affect the presentation with either grammer,words,and how you explain it.

Explanation:

(can i have brainliest) ^--^

In the lab, you defined the information systems security responsibility for each of the seven domains of a typical IT infrastructure. In which domain would you be most likely to secure access through the Internet and from employees’ homes?

Answers

Answer:

Remote Access Domain

Explanation:

Remote access Domain allows users to enter into system network through VPN.

What is the grooming process as it relates to online predators

Answers

the process by which online predators lure in minors to get close enough to hurt them.

How does so called marshalling solve the problem of different byte ordering of sender and receiver? 8. What is the purpose of a portmapper? How does so called marshalling solve the problem of different byte ordering of sender and receiver ?
8 . What is the purpose of a portmapper ?​

Answers

Marshalling solve the problem of different byte ordering of sender and receiver by:

By the use of Common Object Request Broker Architecture (CORBA):

What is Marshalling?

Marshalling is the act of moving and formatting a group of data structures into an external data depiction type good for transmission in a message.

A port mapper is known to be a kind of protocol that tells or map the number or the kind of version of any type of Open Network Computing Remote Procedure Call (ONC RPC) program to a port that is often used in the work of networking by that version of that given program.

Learn more about portmapper from

https://brainly.com/question/879750

#SPJ1

1. What is virtual memory?
The use of non-volatile storage, such as disk to store processes or data from physical memory
A part of physical memory that's used for virtualisation
Some part of physical memory that a process though it had been allocated in the past
O Future physical memory that a process could be allocated

Answers

Answer:

The use of non-volatile storage, such as disk to store processes or data from physical memory.

Explanation:

Virtual memory is used by operating systems in order to allow the execution of processes that are larger than the available physical memory by using disk space as an extension of the physical memory. Note that virtual memory is far slower than physical memory.

The purpose of post market surveillance is to make regulation more effective and recalls easier

True or false

Answers

Answer:True

Explanation:

The purpose of post-market surveillance is to make regulation more effective and recalls easier. Post-market surveillance plays a crucial role in monitoring the safety and effectiveness of products after they have been approved and made available in the market. It helps regulatory authorities identify and address any issues or risks associated with the product's use, leading to more effective regulation. Additionally, by monitoring products in the market, post-market surveillance facilitates the identification of potential problems, which can make recalls easier if necessary to protect public health and safety.

Please help ASAP!
Which type of game is most likely to have multiple different outcomes?

A. shooter game

B. puzzle game

C. platform game

D. role-playing game

Answers

Role play game multiple options involved

When i use for function the output is ['Banana', 'Orange']; However, when used if function the output is ['Apple', 'Banana', 'Orange']. Why?

foods = ["Apple", "Banana", "Pineapple", "Orange"]

removeFoods = foods[2]
for removeFoods in foods:
foods.remove(removeFoods)

print(foods)

________

foods = ["Apple", "Banana", "Pineapple", "Orange"]

removeFoods = foods[2]
if removeFoods in foods:
foods.remove(removeFoods)

print(foods)

Answers

Answer:

Explanation:

The difference in the output is due to the fact that the for loop is iterating over the list foods, while the if statement is only evaluating a single element in the list.

In the for loop, the variable removeFoods is being assigned the value of each element in the list in turn, and the foods.remove(removeFoods) line is being executed for each element. This means that the for loop will iterate over the entire list and remove all the elements except the last one.

In the if statement, the variable removeFoods is only being evaluated once, and the foods.remove(removeFoods) line is only being executed if removeFoods is in the list. Since removeFoods is equal to "Pineapple", and "Pineapple" is not in the list, the if statement does not execute and no elements are removed from the list.

So the difference in the output is due to the different ways that the two blocks of code are interacting with the list.

he files provided in the code editor to the right contain syntax and/or logic errors. In each case, determine and fix the problem, remove all syntax and coding errors, and run the program to ensure it works properly.

An example of the program is shown below:

Enter a number between 1 and 20 >> 5
5 4 3 2 1 Blastoff!
JAVA CODE:
// Prompt user for value to start
// Value must be between 1 and 20 inclusive
// At command line, count down to blastoff
// With a brief pause between each displayed value
import java.util.Scanner;
public class DebugSix3
{
public static void main(String[] args)
{
Scanner keyboard = new Scanner(System.in);
int userNum, val;
final int MIN = 1;
final int MAX = 20;
final int TIME_WASTER = 100000;
System.out.print("Enter a number between " + MIN +
" and " + MAX + " >> ");
userNum = keyboard.nextInt();
while(userNum < MIN && userNum < MAX)
{
System.out.println("Number out of range");
System.out.print("Enter a number between " + MIN + " and " +
MAX + " inclusive >> ");
userNum = keyboard.nextInt();
}
for(val = userNum; val == 0; --val)
{
System.out.print(val + " ");
for(int x = 0; x < TIME_WASTER; ++x)
for(int y = 0; y < TIMEWASTER; ++y)
for(int z = 0; z < TIME_WASTER;);
// Adjust these numbers for faster or slower performance
}
System.out.println("Blastoff!");
}
}

Answers

Fixed code:

import java.util.Scanner;

public class DebugSix3 {
public static void main(String[] args) {
Scanner keyboard = new Scanner(System.in);
int userNum, val;
final int MIN = 1;
final int MAX = 20;
final int TIME_WASTER = 100000;

Kotlin:
System.out.print("Enter a number between " + MIN + " and " + MAX + " >> ");
userNum = keyboard.nextInt();

while (userNum < MIN || userNum > MAX) {
System.out.println("Number out of range");
System.out.print("Enter a number between " + MIN + " and " + MAX + " inclusive >> ");
userNum = keyboard.nextInt();
}

for (val = userNum; val >= 0; --val) {
System.out.print(val + " ");
try {
Thread.sleep(1000);
} catch (InterruptedException e) {
e.printStackTrace();
}
}
System.out.println("Blastoff!");
}

Changes made:

Fixed the while loop condition to use OR instead of AND
Fixed the for loop condition to use greater than or equal to instead of equal to
Added a try-catch block to pause the loop for 1 second using Thread.sleep() instead of nested for loops
Fixed some syntax errors and indentation issues.

program to take the command line input to cut down the blast off.

// DebugSix3.java

// Prompt user for value to start

// Value must be between 1 and 20 inclusive

// At command line, count down to blastoff

// With a brief pause between each displayed value

import javax.swing.*;

public class DebugSix3

{

 public static void main(String[] args)

 {

   String userNumString;

   int userNum, val;

   final int MIN = 1;

   final int MAX = 20;

   userNumString = JOptionPane.showInputDialog(null,

       "Enter a number between " + MIN + " and " + MAX + " inclusive");

   userNum = Integer.parseInt(userNumString);

   while(userNum < MIN || userNum > MAX)

   {

      userNumString = JOptionPane.showInputDialog(null,

       "Number out of range" +

       "\nEnter a number between " + MIN + " and " + MAX + " inclusive");

      userNum = Integer.parseInt(userNumString);

   }

   for(val = userNum; val > 0; --val)

   {

     System.out.print(val + "  ");

     for(int x = 0; x < 100000; ++x)

      for(int y = 0; y < 10000; ++y);

      // Adjust these numbers for faster or slower performance

   }

   System.out.println("Blastoff!");

 }

}

learn more about command line input here:

https://brainly.com/question/19569210

#SPJ1

1.3 Wifi, cell phone towers and telephone cables are examples of information systems in the ITC framework. True False​

Answers

Answer:

Explanation:

True. Wi-Fi, cell phone towers, and telephone cables are all examples of information systems that fall under the Information and Communication Technology (ICT) framework. They are all used to transmit and receive data and are used to connect people and devices to each other, allowing them to share information and communicate. Wi-Fi is used to provide wireless internet access, cell phone towers are used to transmit and receive signals for cell phones, and telephone cables are used to transmit and receive signals for telephone calls. All of these technologies are critical to the functioning of modern communication and information systems.

Note that it is false to state that Wifi, cell phone towers and telephone cables are examples of information systems in the ITC framework. Rather, they are part of an ICT framework.

Why is the above statements false?

While WiFi, cell phone towers, and telephone cables are components of information and communication technology (ICT) infrastructure, they are not examples of information systems within the ICT framework.

Information systems refer to the combination of people, processes, data, and technology that work together to collect, process, store, and disseminate information for decision-making and problem-solving purposes.

Examples of information systems include transaction processing systems, management information systems, decision support systems, and executive information systems, among others.

Learn more about   ICT framework.at:

https://brainly.com/question/33929707

#SPJ2

you are writing a declaration for a new class called king that represents a chess piece, and it has already been started for you below. assuming that the class chesspiece is already defined, change the class declaration to indicate that king is a subclass of chesspiece (do not add anything inside the braces, which should remain blank for this question).

Answers

The declaration class King : ChessPiece creates a new class King that is a subclass of the existing class ChessPiece.

class King : ChessPiece

In this example, the declaration for the King class indicates that it is a subclass of the ChessPiece class. This means that the King class inherits all of the properties and methods of the ChessPiece class, and can add additional properties and methods as needed. The syntax for declaring a subclass in C++, Java, and other similar programming languages is to include the name of the parent class after a colon : following the name of the subclass.

In this case, the declaration for the King class specifies that it is a subclass of the ChessPiece class, which means that the King class inherits all of the properties and methods of the ChessPiece class. The declaration class King : ChessPiece creates a new class King that is a subclass of the existing class ChessPiece. The braces {} following the declaration are left blank, meaning that no properties or methods are defined within the class yet.

Learn more about programming languages here:

https://brainly.com/question/13563563

#SPJ4

When an external device becomes ready to be serviced by the processor the device sends a(n) _________ signal to the processor? A) accessB) haltC) handlerD) interrupt

Answers

When an external device becomes ready to be serviced by the processor the device sends a access.

What is processor?

A processor is an integrated electronic circuit that performs the calculations that run a computer. A processor performs arithmetical, logical, input/output (I/O) and other basic instructions that are passed from an operating system (OS). Most other processes are dependent on the operations of a processor.

The terms processor, central processing unit (CPU) and microprocessor are commonly linked as synonyms. Most people use the word “processor” interchangeably with the term “CPU” nowadays, it is technically not correct since the CPU is just one of the processors inside a personal computer (PC).

The Graphics Processing Unit (GPU) is another processor, and even some hard drives are technically capable of performing some processing.

To know more about computer

https://brainly.com/question/614196

#SPJ4

How long does it take to learn python

Answers

Answer:

five to 10 weeks

On average, it can take anywhere from five to 10 weeks to learn the basics of Python programming, including object-oriented programming, basic Python syntax, data types, loops, variables, and functions.

:

It can take up to five to 10 weeks to learn python :)

Write a program using integers userNum and divNum as input, and output userNum divided by divNum three times.

Answers

Answer:

Follows are the code to this question:

#include <iostream>//header file

using namespace std;

int main() //defining main method

{

int userNum, divNum;//defining integer variable

cin>> userNum >> divNum;//input values

cout <<"First-time divide: "<<userNum / divNum<<endl;//divide value First time  

cout <<"Second-time divide: " << userNum / divNum/divNum<<endl; //divide value Second time

cout<<"Third-time divide: "<< userNum /divNum/divNum/divNum<<endl;//divide value Third time

return 0;

}

Output:

2000

2

First-time divide: 1000

Second-time divide: 500

Third-time divide: 250

Explanation:

In this code two integer variable "userNum and divNum" is declared that uses the input method to input value from the user-end, and after input the value it divides the "userNum by divNum" three times, that is defined as follows:

In this code, the user input the value 2000 and 2, in the first divides it will give 1000, in the second time divide it will give 500, and in the third time it will give 250.

We would like the set of points given in the following figure into 1D space. The set of points has been
generated using this instruction [X, y = make_moons(n_samples = 100)], where X are the 2D features
and y are the labels(blue or red).
How to do that while keeping separable data point with linear classification? Give the
mathematics and the full algorithm.
How to apply the SVM algorithm on this data without dimension reduction? Give the
mathematics and full algorithm.

Answers

One way to project the 2D data points onto a 1D space while preserving linear separability is through the use of a linear discriminant analysis (LDA) technique. LDA finds the linear combination of the original features that maximizes the separation between the different classes.

What is the mathematics  in SVM algorithm?

The mathematics behind LDA involve finding the eigenvectors of the within-class scatter matrix and the between-class scatter matrix and selecting the eigenvector that corresponds to the largest eigenvalue. The full algorithm for LDA can be outlined as follows:

Compute the mean vectors for each class

Compute the within-class scatter matrix (SW) and the between-class scatter matrix (SB)Compute the eigenvectors and eigenvalues of the matrix (SW⁻¹SB)Select the eigenvector that corresponds to the largest eigenvalue as the linear discriminantProject the original data onto the new 1D space using the linear discriminant

Regarding the SVM algorithm, it can be applied directly to the original 2D data without the need for dimension reduction. The mathematics behind SVM involve finding the hyperplane that maximizes the margin, or the distance between the closest data points of each class, while also ensuring that the data points are correctly classified.

The full algorithm for SVM can be outlined as follows:

Select a kernel function (e.g. linear, polynomial, radial basis function)Train the model by solving the optimization problem that maximizes the marginUse the trained model to classify new data points by finding the hyperplane that separates the different classesIt is important to note that, in case of non-linearly separable data, SVM algorithm uses the kernel trick to map the original data into a higher dimensional space, where the data is linearly separable.

Learn more about algorithm from

https://brainly.com/question/24953880
#SPJ1

who invent cars and who invent bikes and who invent pc

Answers

Answer:

Cars were invented in 1886 by Karl Benz.The term bicycle was coined in France in the 1860s, but The first verifiable claim for a practically used bicycle belongs to German Baron Karl von Drais in 1817The first computer was by Charles Babbage, an English mechanical engineer and polymath he originated the concept of a programmable computer.

9. Computer 1 on network A, with IP address of 10.1.1.10, wants to send a packet to Computer 2, with IP address of
172.16.1.64. Which of the following has the correct IP datagram information for the fields: Version, minimum
Header Length, Source IP, and Destination IP?

Answers

Answer:

Based on the given information, the IP datagram information for the fields would be as follows:

Version: IPv4 (IP version 4)

Minimum Header Length: 20 bytes (Since there are no additional options)

Source IP: 10.1.1.10 (IP address of Computer 1 on network A)

Destination IP: 172.16.1.64 (IP address of Computer 2)

So the correct IP datagram information would be:

Version: IPv4

Minimum Header Length: 20 bytes

Source IP: 10.1.1.10

Destination IP: 172.16.1.64

to control specific offers for goods or services and thus the resulting contracts, important terms to provide online include

Answers

Important conditions to present online include a clause referring to the management of any dispute to regulate certain offers for products or services and therefore the following contracts.

What is it known as online?

When a device is on and linked to other things, such as a computer, a network, or a device like a printer, it is said to be online. Online now refers to being hosted in more recent times.

What do you mean by an online course?

An online course is one that is delivered over the Internet. Courses are often performed using a lms, where students may access their course curriculum, track their academic progress, and interact with their peers and instructors.

To know more about Online visit:

https://brainly.com/question/1395133

#SPJ1

The complete question is-

To control specific offers for goods or services and thus the resulting contracts, important terms to provide online include

a). a detailed history of the particular business.

b). an updated list of the goods or services.

c). a provision relating to the resolution of any dispute.

d). positive reviews from customers or clients.

Part 1 Develop a 2- to 3-page table in Microsoft® Word that lists the roles and responsibilities of each of the following with respect to security. Use the following column headings: Title Role Responsibilities Use the following row headings: Chief Executive Officer (CEO) Chief Operations Officer (COO) Chief Financial Officer (CFO) Chief Information Officer (CIO) Chief Information Security Officer (CISO) Senior Security Manager Information Security Architect Information Security Engineer Information Security Auditor Information Security Analyst Security Technician/Specialist

Answers

The roles and responsibilities of the below-listed person with respect to security are:

Chief Executive Officer (CEO)- This person is responsible for making major corporate decisions, managing the overall operations and resources of a company

Chief Operations Officer (COO)- He is usually the second-in-command at the firm and can stand in when the CEO is unavailable.

Chief Financial Officer (CFO)- He is responsible for tracking cash flow and financial planning and analyzing the company's financial strengths

Chief Information Officer (CIO)- This person is in charge of information technology initiatives and strategy.

Chief Information Security Officer (CISO)- individual primarily responsible for the assessment, management, and implementation of information security in the organization.

Senior Security Manager Information- This person is in charge of managing the day-to-day operations of their organization's security department

Security Architect Information- This person is responsible for assessing the organization's systems for weaknesses. They conduct penetration tests

Security Engineer Information- This person is in charge of building digital security protocols, operating a cyber security system and maintaining an IT security infrastructure

Security Auditor Information- This person looks at the safety and effectiveness of computer systems and their security components,

Security Analyst- This person protects computer networks from cyber attacks, creates cybersecurity policies and practices f

Security Technician/Specialist- This person has the main duty to maintain and repair security-related concerns in a company.

Read more about Senior Security Manager here:

https://brainly.com/question/14467050
#SPJ1

If you have downloaded this book's source code from the companion Web site, you will find a file named text.txt in the Chapter 12 folder. (The companion Web site is at www.pearsonhighered/gaddis.) The text that is in the file is stored as on sen- tence per line. Write a program that reads the file's contents and calculates the average of words per sentence.

Answers

Answer:

Explanation:

The following python code loops through each line within a file called text.txt and counts all the words, then it divides this count by the number of sentences in the text file. Finally, output the average number of words per sentence.

f = open("text.txt", "r")

all_words = 0

sentences = 0

for x in f:

   list = x.split(' ')

   all_words += len(list)

   sentences += 1

average = all_words / sentences

print("There are an average of " + str(average.__round__()) + " words in each sentence.")

If you have downloaded this book's source code from the companion Web site, you will find a file named

When it comes to memory, why is it important to have enough storage space on a hard drive when using many RAM intensive programs?

Answers

Answer:

Memory and storage are important concepts to master in Information Technology. ... This type of memory is volatile which means that the actual data disappears when the computer loses power. Because memory needs to be much faster than storage, it is rather more expensive than storage per GB.

Explanation:

i make you brainliest

Answers

alright sounds like a plan to me

Answer:

Explanation:

I apprieciate your kindness here i will give you some points

which of the following technologies is (are) being used to replace the older edi for specifying data standards

Answers

JavaScript object notation and Extensible markup language this technologies are being used to replace the older EDI for specifying data standards.

What does "extensible markup language" mean?

The standard markup language known as Extensible Markup Language (XML) establishes the format guidelines for data encoding. One key benefit is that it offers a clear way to describe structured data for use in applications, particularly as a format for message storage and transmission.

What is the purpose of JavaScript Object Notation?

The text format JSON, which stands for JavaScript Object Notation, is used to convey data. JSON data is portable and relatively easy for humans to read and write in real time. Although JSON was initially created as a JavaScript subset, it is actually language-independent.

Learn more about the JavaScript here: https://brainly.com/question/16698901

#SPJ4

NOTE: The given question is incomplete on the portal. Here is the complete question.

QUESTION: Which of the following technologies is(are) being used to replace the older EDI for specifying data standards?

a. JavaScript object notation

b. Hypertext transfer protocol

c. Extensible markup language

d. Both (a) and (b)

e. Both (a) and (c)

Anyone who has an iPod touch and downloads apps from iTunes participates in Digital Commerce and is a digital consumer.

Answers

Problem can be solved if you know the problem and what the consumer looking for

Help pls.

Write python 10 calculations using a variety of operations. Have a real-life purpose for each calculation.
First, use Pseudocode and then implement it in Python.

For example, one calculation could be determining the number of gallons of gas needed for a trip based on the miles per gallon consumed by a car.

Answers

A python program that calculates the number of gallons of gas needed for a trip based on the miles per gallon consumed by a car is given below:

The Program

def printWelcome():

   print ('Welcome to the Miles per Gallon program')

def getMiles():

   miles = float(input('Enter the miles you have drove: '))

   return miles

def getGallons():

   gallons = float(input('Enter the gallons of gas you used: '))

   return gallons

def printMpg(milespergallon):

   print ('Your MPG is: ', str(milespergallon))

def calcMpg(miles, gallons):

   mpg = miles / gallons

   return mpg

def rateMpg(mpg):

   if mpg < 12:

       print ("Poor mpg")

   elif mpg < 19:

        print ("Fair mpg")

   elif mpg < 26:

        print ("Good mpg")

   else:

        print ("Excellent mpg")

if __name__ == '__main__':

   printWelcome()

   print('\n')

   miles = getMiles()

   if miles <= 0:

       print('The number of miles cannot be negative or zero. Enter a positive number')

       miles = getMiles()

   gallons = getGallons()

   if gallons <= 0:

       print('The gallons of gas used has to be positive')

       gallons = getGallons()

   print('\n')

   mpg = calcMpg(miles, gallons)

   printMpg(mpg)

   print('\n')

   rateMpg(mpg)

Read more about python programming here:

https://brainly.com/question/26497128

#SPJ1

Other Questions
Let r = 1+ cos be a polar curve. Find all values of 0 where the graph has vertical tangent lines. Quadrilateral ABCD has vertices at A(0,0), B(0,3), C(5,3), and D(5,0). Find the vertices of the quadrilateral after a dilation with scale factor 2.5.PLS ANSWER ASAP the nurse is caring for a client with an elevated thyroid stimulating hormone (tsh) level. which assessments are consistent with this finding? select all that apply. A 5K race is about 3.1 miles. Kevin runs 3.5 miles on Monday, 4 miles on Wednesday and 1.8 miles on Friday. About how many 5K races would Kevin have completed? ORUSSIA INVADES UKRAINE PUTTING IT ALL TOGETHER A. Write the letter that corresponds to the best answer on the line beside each question: 1. Who is the president of Ukraine? a) Vladimir Putin b) Joe Biden c) Boris Johnson d) Volodymyr Zelensky 2. Which Ukrainian city was surrounded by Russian troops and suffered heavy damage? a) Mariupol b) Kyiv d) Odesa c) Moscow 3. Many countries have imposed strong economic against Russia. a) sanctions b) taxes c) subsidies d) duties In creating the Constitution, the Founding Fathers had to reach a number of important compromises so that the wants and needs of all thirteen states were considered and incorporated into the new document.Match the compromise named to its description...------ which client problem does the nurse determine as the priority for the client experiencing chemotherapy-induced peripheral neuropathy? When a 10% decrease in price produces more than a 10% increase in quantity sold, the product or service is responsive to price changes and is considered to be Blank______. Barrier method of contraception includes all exceptA diaphragmB condomC vaultD vasectomy What are the top three causes of death in childhood in order? claim about Disability rights Problem 2 (30 points) - Benefit/Cost Analysis Given the financial data for three alternatives,A B CInitial cost || $700 $1,200 $800 EUAB 350 500 200 Life 3 4 5 MARR = 10% Using the Benefit/Cost ratio analysis (incremental), which Alternative should be chosen? What is the greatest common monomial factor of 24y^4 - 12y^3 +8y^2A. 4y^2B. 4C. 4yD. y According to the textbook, Cuvier addressed the comparative anatomy of fossils in a theory of life changes called 11) The Alternating Series Test (-1)" 12) Ratio Test n!n 3 gh (2n+3)! 3n+5 13) Find the first four terms of the Taylor Series expansion about Xo = 0 for f(x) = 1-x Which of the following is not a factor for determining the price elasticity of demand?A.Sanitary conditionsB.Nature of goodsC.Time periodD.Availability of substitutes when a nurse notes that the patient appears to be sleeping, is demonstrating irregular respirations, and is showing eye movement, the nurse identifies the stage of sleep the patient is experiencing as: Which of the following carbohydrates is composed of glucose andgalactose?Select one:O a. Dextroseb. LactoseO c. SucroseO d. MaltoseO e. Fructose A sandwich shop owner wants to survey customers about new menu options. To get the sample, the owner surveys the 4th customer of the day (with 4 being a randomly chosen value), then surveys every 10th customer after that. Which sampling method was used?cluster samplingsimple random samplingstratified random samplingsystematic random sampling After performing an experiment to determine what time of day adults aremost productive, you display your data as a graph to be analyzed. Whichphase of inferential statistics is this?O A. SurveyB. Data organizationOC. Probability-based inferenceOD. Data gathering