write a test program that prompts the user to enter a phone number as a string. the input number may contain letters. the program translates a letter (upper- or lowercase) to a digit and leaves all other characters intact. here is a sample run of the program:

Answers

Answer 1

The complete python code program is used to prompts the user to enter a phone number as a string.

What is python code program?

Python code program is defined as a series of Python commands that have been programmed to perform a specific action. In contrast to other programming languages, which frequently use semicolons or parentheses, Python uses new lines to finish a command.

The complete python code program is written in many different steps . The complete program contain both input and output program.

Thus, the complete python code program is used to prompts the user to enter a phone number as a string.

To learn more about python code program, refer to the link below:

https://brainly.com/question/13246781

#SPJ1


Related Questions

is a special-purpose programming language for accessing and manipulating data stored in a relational database. a. access b. java c. structured query language (sql) d. query by example (qbe)

Answers

Structured Query Language (SQL) is a special-purpose programming language for accessing and manipulating data stored in a relational database.

Structured Query Language (SQL) is a domain-specific programming language designed for the management of data held in a relational database management system (RDBMS). It is a language that is used to manipulate data that is stored in relational databases. Relational databases are those that store data in a tabular format.

The SQL syntax is relatively simple and easy to understand. It is highly portable and is used in a wide variety of applications. SQL queries are used to search and retrieve data from databases. They are also used to update data in the database, insert new data into the database, and delete data from the database. In addition, SQL is used to define the structure of a database and the relationships between the tables in the database.

Learn more about SQL visit:

https://brainly.com/question/20264930

#SPJ11

Which of the following statements is true of solar thermal collectors?

Answers

A solar thermal collector simply collects heat by absorbing sunlight. It harnesses the energy from the sun and converts it into heat.

Your information isn't complete as you didn't provide the options. Therefore, an overview of a solar thermal collector will be provided. A solar thermal collector simply collects heat by absorbing sunlight.

It should be noted that the term "solar collector" simply means a device for solar hot water heating. Solar thermal collectors can be used in residential, commercial, or industrial buildings.

Read related link on:

https://brainly.com/question/25681288

What report shows which types of mobile devices visited a website?Technology > Network reportAll traffic > Source/Medium reportSite Content > Landing Page reportMobile > Devices report

Answers

The "Mobile > Devices" report is the one that shows which types of mobile devices visited a website.

What is Mobile > Devices  report ?

This Mobile > Devices  report provides information on the specific mobile devices that accessed the website including details such as device brand, model, operating  system  and screen resolution. It helps website owners and marketers  understand the mobile landscape of their audience and optimize their website and content for different mobile devices.

By analyzing this report, one can gain insights into the mobile devices that visitors use to access the website and make informed decisions regarding mobile optimization strategies and user experience improvements.

Learn more about mobile devices at

https://brainly.com/question/23433108

#SPJ4

There are N bulbs numbered from 1 to N, arranged in a row. The first bulb is plugged into the power socket and each successive bulb is connected to the previous one. (Second bulb to first, third to second) Initially, all the bulbs are turned off. A moment K (for K from 0 to N-1), the A[K]-th bulb is turned on. A bulbs shines if it is one and all the previous bulbs are turned on too. Write a function in java that given an Array A of N different integers from 1 to N, returns the number of moments for which every turned on bulb shines

Answers

Here's an example of a Java function that solves the problem:

public class BulbMoments {

   public static int countShiningMoments(int[] A) {

       int shiningMoments = 0;

       int maxIndex = 0;

       for (int i = 0; i < A.length; i++) {

           maxIndex = Math.max(maxIndex, A[i]);

           if (maxIndex == i + 1) {

               shiningMoments++;

           }

       }

       return shiningMoments;

   }

  public static void main(String[] args) {

       int[] bulbs = {2, 3, 1, 5, 4};

       int moments = countShiningMoments(bulbs);

       System.out.println("Number of shining moments: " + moments);

   }

}

The `countShiningMoments` function takes an array `A` as input and returns the number of moments for which every turned on bulb shines.

In the function, we keep track of the maximum index encountered so far. If the maximum index matches the current position (i + 1), it means that all the previous bulbs have been turned on, and the current bulb shines. We increment the `shiningMoments` count in such cases.

In the provided example, the function is called with an array [2, 3, 1, 5, 4]. The output will be "Number of shining moments: 3", indicating that there are three moments where every turned on bulb shines.

For more questions array, click on:

https://brainly.com/question/29989214

#SPJ8

the bookstore sold 8 books for $66 at that rate how much was one book

Answers

8x=66

8x/8 = 66/8

x=8.25$

What are some reasons a person might choose to remain anonymous on the Internet?

Answers

Answer:

There would be a lot for reasons, to get out of their real world as maybe they are getting abused, hurt, bullied and many other reasons. Also, people don't like their identity so they try cover themselves up too. Another reason is because they would be able to do and say anything without having problems and consequences.

Explanation:

1) People are afraid of self revelation to people they don’t know.

2) They are afraid of showing strangers what they really feel and their own lack of knowledge.

3) They fear that someone, who takes offense at what they say could do, or say, “something” to hurt them or their families

Etc...

The range of an unsigned 6 bit binary number is
0-63
0-64
0-127
1-128

Answers

Answer:

6 bit = 2^6-1=64-1=63

from 0 to 63

What type of variable is “a” in : a=x/4 (in C++ programming language?)

Answers

Answer:

In C++ programming language, "a" would be a variable of type integer or floating-point number depending on the type of "x".

driswers.
In what two ways is the plain text form of markup languages an advantage?
Developers don't need a special program to view or edit it.
Developers can use it to make web pages more dynamic.
It is secure because developers can view it only in a text editor.
It is human-readable, but machines cannot read or change it.
It makes markup languages independent of hardware and software.

driswers.In what two ways is the plain text form of markup languages an advantage?Developers don't need

Answers

Answer:

Developers don't need a special program to view or edit it.

It makes markup languages independent of hardware and software

Explanation:

Markup just means that it's easily readable by humans. However, you'll often need specific software to be able to edit it, as opposed to plaintext, which could be edited in notepad.

Why is it a good idea not to change the subject line when replying to a message?
O so that the reply is sent to the original sender
O so that the reply does not bounce back as undeliverable
O so that the reply matches with the sender's original message
O so that the reply does not inadvertently include unintended recipients

Answers

Answer:

C. so that the reply matches with the sender's original message.

Explanation:

The Sender Message Channel Receiver (SMCR) model of communication was developed and created by David Berlo in 1960. SCMR was developed from the Shannon-Weaver model of communication of 1949.

The SCMR model of communication comprises of four (4) main components and these are;

1. Sender (S): this is typically the source of information (message) or the originator of a message that is being sent to a receiver. Thus, they are simply the producer of a message.

2. Channel (C): this is the medium used by the sender for the dissemination or transmission of the message to the recipient. For example, telephone, television, radio, newspapers, billboards etc.

3. Message (M): this is the information or data that is being sent to a recipient by a sender. It could be in the form of a video, audio, text message etc.

4. Receiver (R): this is typically the destination of information (message) or the recipient of a message that is being sent from a sender. Thus, the receiver is any individual who is able to read, hear or see and process the message being sent or communicated in the communication process.  

Basically, the communication channel used in SCMR must connect the sender with the desired recipients.

Hence, it is a good idea not to change the subject line when replying to a message, so that the reply matches with the sender's original message.

Answer:

Explanation:

Its C not B

Which of the arts, a/v technology, and communication career cluster pathways are involved with producing a product for an audience? check all that apply. Visual artsperforming artsaudio/visual technology and filmjournalism and broadcastingprinting technologytelecommunications.

Answers

The arts, a/v technology, and communication career cluster pathways involved with producing a product for an audience are audio/visual technology and film journalism, and broadcasting. The correct option is c.

What are arts, a/v technology?

Designing, creating, exhibiting, performing, writing, and publishing multimedia material, including visual and performing arts and design, journalism, and entertainment services, are the main goals of this Career Cluster.

Students take a one-year course in which they study the arts, audio/video technologies, and communications systems.

Therefore, the correct option is c, audio/visual technology and film journalism, and broadcasting.

To learn more about arts, a/v technology, refer to the link:

https://brainly.com/question/3870657

#SPJ1

The question above pls answer quickly

The question above pls answer quickly

Answers

Answer:

B

Explanation:

Please help me!!!

Use searching laterally to find more out about obesitymyths.com and if it is credible. Share your findings here.

Answers

Explanation:

I am verry bad at computer science. ...........

Using the search tool, it is discovered that the website is not a credible website.

Why is the website not credible?

This is due to the fact that the domain of the website has been put up for sale. The website does not contain information about what its name suggests.

There is a transfer of ownership waiting to happen. Hence we can conclude that it is not a credible website.

Read more on websites here: https://brainly.com/question/1382377

#SPJ2

Can somebody help me and make a code for this in PYTHON, please? I would be very thankful!
It is estimated that China on July 1, 2019. had 1,420,062,022 inhabitants, and India 1,368,737,513. The population in China increases by 0.35% every year, and in India by 1.08%. After how many years will India surpass China in terms of population, assuming that the annual population growth in neither of these two countries will change?
I think it should be used command FOR...

Answers

Code:

population_china = 1420062022

population_india = 1368737513

years = 0

while population_china >= population_india:

   population_china *= 1.0035

   population_india *= 1.0108

   years += 1

print(years)

Output:

6

Explanation:

Using a while loop would probably be of greater use than a for loop since we are increasing the population growth of both countries until India's population surpasses China's population (so a condition needs to be set).

Looking at the code, we first set the original population of both countries in their own variables (population_china, population_india). We also set the 'years' variable at 0, which will increase with respect to the yearly population growths of both countries. In the while loop, the condition population_china >= population_india will allow for the variable 'years' to increase until population_india surpasses population_china. Once India's population is larger than China's population, we are left with the number of years it takes for India's population to surpass China's population, which is 6 years.

Hope this helps :)

Word processing software is used primarily by schools rather than businesses.
True or false

Answers

Answer:

False.

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

Generally, the Microsoft Word software is used by various businesses for processing and formatting text-based documents.

In Microsoft Word, formatting refers to the appearance of texts in a document.

Formatting a text involves performing tasks such as, bold, underline, italics, font-size, font-types, color etc. The commands to perform the above tasks are mainly found in the format menu of the Home tab.

Formatting a document is important and necessary because it makes the word document clear and easy to read.

Hence, Word processing software such as Microsoft Word, Notepad, etc., is used primarily by businesses rather than schools because most businesses deal with the creation and transfer of documents from one department to another or to other businesses.

This ultimately implies that, business firms or organizations are more inclined to use Word processing software to create paper documents for the day-to-day business activities they conduct unlike a school who rarely does.

You have two Windows Server 2016 computers with the Hyper-V role installed. Both computers have two hard drives, one for the system volume and the other for data. One server, HyperVTest, is going to be used mainly for testing and what-if scenarios, and its data drive is 250 GB. You estimate that you might have 8 or 10 VMs configured on HyperVTest with two or three running at the same time. Each test VM has disk requirements ranging from about 30 GB to 50 GB. The other server, HyperVApp, runs in the data center with production VMs installed. Its data drive is 500 GB. You expect two VMs to run on HyperVApp, each needing about 150 GB to 200 GB of disk space. Both are expected to run fairly disk-intensive applications. Given this environment, describe how you would configure the virtual disks for the VMs on both servers.

Answers

The virtual disk configuration for the VMs on both servers in this environment is shown below.

In the Hyper V Test,

Since there will be two or three virtual machines running at once, each of which needs between 30 and 50 GB of the total 250 GB of disk space available,

What is virtual disks?

Setting up 5 virtual disks, each 50 GB in size.

2 VMs each have a 50 GB virtual drive assigned to them.

The above setup was chosen because running three VMs with various virtual disks assigned to them will not pose an issue when two or three VMs are running concurrently and sharing the same virtual disk. This is because the applications are disk-intensive.

To learn more about virtual disks refer to:

https://brainly.com/question/28851994

#SPJ1

Given this environment, the virtual disk configuration for the VMs on both servers is shown below. Because two or three VMs will be running at the same time, and each VM has disk requirements ranging from 30 to 50 GB of total disk space of 250 GB.

What is Hyper V Test?While there are several methods for testing new virtual machine updates, Hyper-V allows desktop administrators to add multiple virtual machines to a single desktop and run tests. The Hyper-V virtualization technology is included in many versions of Windows 10. Hyper-V allows virtualized computer systems to run on top of a physical host. These virtualized systems can be used and managed in the same way that physical computer systems can, despite the fact that they exist in a virtualized and isolated environment. To monitor the utilization of a processor, memory, interface, physical disk, and other hardware, use Performance Monitor (perfmon) on a Hyper-V host and the appropriate counters. On Windows systems, the perfmon utility is widely used for performance troubleshooting.

Therefore,

Configuration:

Creating 5 Virtual disks of 50 GB each.

1 virtual disk of 50 GB is assigned to 2 VM.

The above configuration is because since two or three VM will be running at the same time and using the same virtual disk will cause a problem since the applications are disk intensive, running three VMs with different virtual disks assigned to them, will not cause a problem.

For Hyper V App,

Two VM will run at the same time, and the disk requirement is 150 - 200 GB of 500 GB total disk space.

Configuration:

Creating 2 virtual disks of 200 GB each with dynamic Extension and assigning each one to a single VM will do the trick.

Since only two VMs are run here, the disk space can be separated.

To learn more about Hyper V Test, refer to:

https://brainly.com/question/14005847

#SPJ1

Can anyone please help me on these two questions it would really help xxx

Can anyone please help me on these two questions it would really help xxx

Answers

Answer: No one can interpret or hack it.

Explanation:

Because there is nothing to hack.

take it from someone who hack their teachers laptop as a dare. It was so easy.

write a function named add record that takes 3 parameters all of which are strings and doesnt return a value. there is a database saved in a file named exception.db containing a table named vessel with columns score, assure, and however. insert a new record into this table using the 3 parameters of this function as its values for the three columns.

Answers

To create the "add record" function that inserts a new record into the "vessel" table in the "exception.db" database, below given steps can be followed.

The steps are:
1. Import the necessary modules: We will need the SQLite module to connect to the database and execute SQL queries.
2. Define the function: We will name the function "add_record" and it will take three parameters, all of which are strings. These parameters represent the values that will be inserted into the "score", "assure", and "however" columns of the "vessel" table.
3. Connect to the database: We will use the SQLite module to connect to the "exception.db" database.
4. Prepare the SQL query: We will create an SQL query that inserts a new record into the "vessel" table with the values from the three parameters.
5. Execute the SQL query: We will use the SQLite module to execute the SQL query and insert the new record into the "vessel" table.
6. Close the database connection: We will close the database connection to ensure that any changes made to the database are saved.

Here is the code for the "add record" function:
```

import sqlite3
def add_record(score, assure, however):
   # Connect to the database
   conn = sqlite3.connect("exception.db")
   c = conn.cursor()
  # Prepare the SQL query
   query = "INSERT INTO vessel (score, assure, however) VALUES (?, ?, ?)"
   values = (score, assure, however)
   # Execute the SQL query
   c.execute(query, values)
   # Close the database connection
   conn.commit()
   conn.close()
```

To use this function, you would simply call it with three string arguments representing the values to be inserted into the "score", "assure", and "however" columns. For example:
```
add_record("100", "yes", "however text")
```

This would insert a new record into the "vessel" table with a score of 100, an assure value of "yes", and a however value of "however text".

Learn more about database here: https://brainly.com/question/29774533

#SPJ11

Describe each of the principal factors risk factors in
information systems projects (20 marks)

Answers

The principal risk factors in information systems projects encompass various aspects such as project complexity, technology challenges, organizational factors, and external influences.

These factors contribute to the potential risks and uncertainties associated with the successful implementation of information systems projects.

Project Complexity: Information systems projects can be inherently complex due to factors such as scope, scale, and the integration of multiple components. The complexity may arise from intricate business processes, diverse stakeholder requirements, or the need for extensive data management. Complex projects pose risks in terms of project management, resource allocation, and potential delays or cost overruns.

Technology Challenges: Information systems projects often involve implementing new technologies, software systems, or infrastructure. Technological risks include compatibility issues, scalability limitations, security vulnerabilities, and the need for specialized expertise. These challenges may impact the project timeline, functionality, and long-term viability of the system.

Organizational Factors: The success of an information systems project depends on organizational factors such as leadership, communication, and stakeholder engagement. Risks in this domain include lack of management support, insufficient user involvement, resistance to change, inadequate training, and poor project governance. Failure to address these factors can lead to user dissatisfaction, low adoption rates, and project failure.

External Influences: External factors, such as changes in regulatory requirements, market dynamics, or economic conditions, can introduce risks to information systems projects. These factors may necessitate modifications to project scope, increased compliance efforts, or adjustments to business strategies. Failure to anticipate and adapt to external influences can disrupt project timelines and impact the project's overall success.

Understanding and managing these principal risk factors is crucial for effective project planning, risk mitigation, and successful implementation of information systems projects. Proper risk assessment, contingency planning, stakeholder involvement, and ongoing monitoring are essential to minimize the impact of these risks and ensure project success.

Learn more about  information systems here:

https://brainly.com/question/13081794

#SPJ11

2. It enables you to gather data on a specific topic. *a.Interviewb.Questionnairec.Surveyd.Research

Answers

Answer:

Explanation:

am pro

The following code will not compile. Which of the options below would allow the code to compile and run as intended?

if (x >= -10 and <= 10):
print("In range")

Answers

Answer:

Follows are the code to this question:

x=int(input())#use input method with int that takes integer value from user-end  

if (x >= -10 and x<=10):#defining if block that checks x in between -10 to 10

   print("In range")#print message

Output:

6

In range

Explanation:

In this code, the choices were missing that's why the solution to this question can be defined as follows:

In this, x variable using the input method with the int, which takes integer value from the user-end. In the next step, the if block is used, that checks x value lies on between the -10 to 10, to check this condition it used the and logical operator, that run the code when both conditions are true, and at last, it prints the message "In range".

true or false "a list of fonts. typically 3 fonts: the preferred font, one or more alternates, and a generic standard font for if all else fails...use this
font family: Geneva, Tahoma, sans-serif;
font family: ""Gill Sans"", ""Gill Sans MT"", Calibri, sans-serif;"

Answers

The information given regarding the font is correct. Therefore, the correct option is True.

What is the information about

Having a list of typefaces in the order of preference, together with one or more alternatives and a generic standard font as a backup choice in case the desired font is unavailable, is normal practice.

Such font listings include the two font families you suggested, Geneva/Tahoma/sans-serif and "Gill Sans"/"Gill Sans MT"/Calibri/sans-serif. The first list includes the recommended Geneva typeface, a backup Tahoma font, and a generic sans-serif font. The second list includes the fonts "Gill Sans", "Gill Sans MT", and Calibri as three top choices with sans-serif as a backup.

Learn more about font on

https://brainly.com/question/1991747

#SPJ1

a client has requested adjustments to the arrangement and placement of elements on an image. what does the client want changed?

Answers

Considering the situation described above, the client wants the image's recipe to be changed.

What is the Image Recipe?

Image Recipes are characteristics of an image or picture. It includes features like shape, size, form, pattern, line, shadow, tone, color, contrast, positive space and negative space, etc.

Given that the client needs adjustments to the arrangement and placement of elements on an image, this is a request for a change in the image recipe.

Hence, in this case, it is concluded that the correct answer is "the client wants the recipe of the image changed."

Learn more about the Image Recipe here: https://brainly.com/question/1605430

How would I write Alpha Phi Omega in Greek capital letters?

Answers

To write Alpha Phi Omega in Greek capital letters, you would use the following symbols: ΑΦΩ.

Alpha Phi Omega in Greek capital letters is written as ΑΦΩ.

In the Greek alphabet, the first letter is alpha (Α), the sixteenth letter is phi (Φ), and the twenty-third letter is omega (Ω).

To write Alpha Phi Omega in Greek capital letters, we simply use these three letters in order, with each letter capitalized.

The result is ΑΦΩ.

When writing Greek fraternity and sorority names, capital letters are typically used to represent their initials, such as Alpha Phi Omega (ΑΦΩ).  

To know more about Greek visit:

brainly.com/question/30928341

#SPJ11

[4]
) Describe what is involved in the clearing of bank cheques which the bank has collected in the
course of the day.


Plz any answer need it quickly help me if you know

Answers

Answer:

The clearing process begins with the deposit of a cheque in a bank. ... The cheque is passed for payment if the funds are available and the banker is satisfied about the genuineness of the instrument. The cheques that are unpaid are returned to the presenting bank through another clearing called the Return Clearing.

hopes this helps you?????????

Explanation:

list three natural defects of wood

Answers

Answer:

rotting, drying out, decay

Explanation:

decay, rotting, drying out

what is the meaning of .net in computer​

Answers

Answer:

.net is a top-level domain, also known as a TLD. Derived from the word network, it was originally developed for companies involved in networking technology. Today .net is one of the most popular domain names used by companies all over the world to launch their business online.

When would you use database software instead of spreadsheet or word processing software?​

Answers

Answer: When I need to see table relationships and sort data by custom fields.

Explanation:

Answer: When I need to see table relationships and sort data by custom fields.

Explanation: took the quiz

Which of the following are likely reasons people enjoy watching lifelike stories on the screen? Select all that apply.


People develop a connection that is emotional with the stories and/or characters.

The stories remind them of situations they are familiar with.

The situations they see are not familiar to them.

They are distracted by the video and sound combination.

Answers

Answer:

c

Explanation:

I dont know but omost every time I guess I get it right

Answer:

A: People develop a connection that is emotional with the stories and/or characters.

and

D:The stories remind them of situations they are familiar with.

Explanation:

edg2021

Which of the following are likely reasons people enjoy watching lifelike stories on the screen? Select

what did Ada lovelace do

Answers

Answer: Ada Lovelace is often considered to be the first computer programmer!

Explanation: Most wealthy women of the 1800s did not study math and science. Ada Lovelace excelled at them—and became what some say is the world's first computer programmer. Born in England on December 10, 1815, Ada was the daughter of the famous poet Lord George Byron and his wife, Lady Anne Byron.

Other Questions
4. Where does the majority of evaporation on Earth occur? Select a company that you are very familiar with (one in which you work or can research on line) and conduct a SWOT Analysis. Your SWOT analysis should look similar to the figure in the attached SWOT Chart attachment. It would be wise to look up some information about the company online as well. There are lots of business articles on many organizations and you may be able to find some great S,W,O and T to include via research. Be sure to cite these references in your SWOT analysis. In addition to the SWOT Chart (4 cell diagram), submit a one page NARRATIVE explaining/describing all 4 components, Where does the urea in the urine come from? A container has 300 liters of water, and a second container has 700 liters of water. The firstcontainer begins filling up at a rate of 5 liters per minute at the same time the second startsdraining at a rate of 6 liters per minute. Which equation can be used to find the number ofminutes, r, that elapse before the two containers have the same amount of water? which river is located in the far eastern portion of russia and forms a natural border between russia and china? group of answer choices a)volga river b) ob river c) amur river d) aldan river 4 3/8 + 5 1/8 = (make sure you simplify the fraction) Plssss helpppp and thank you so so much in a hydrogen atom which transition would emit the longest wavelength light? select all that apply 1. n If any of the curves has shifted, indicate the direction of the shift, propose a factor (for example, shock) that may have caused the shift, and specify whether ... Question Workspace Check My Work You have savings of $100. You plan to save another $100 at the beginning of each year for 5 years. The account pays annual interest of 8 percent, compounded quarterly. The ending balance (principal plus interest) will be $ at the end of 5 years The managers of an airline analyzed a random sample of flights and found that 48 out of 50 were on time. The airline has 450 flights scheduled for next week. How many flights will be expected to arrive on time? Look at the triangle:What is the value of cos x?8 divided by 1717 divided by 815 divided by 178 divided by 15 For this response, I would like you think abouthow Thoreau's approach to nature is similar, but more importantly,different from the other authors Look at not only how the differentauthors DESCRIBE I NEED HELP PLEASE!!!IM BEGGING YOU PLEASE!! how long does it normally take for a crisis to resolve? Use the picture to answer the question.5cmWhat is the circumference of the circle? Assume =3.14cm WILL MARK BRAINLIEST. Carolina is the vice president of the environmental club at her high school. She is in charge of e-mailing members about upcoming events, answering questions from new members about enrollment, and explaining club guidelines to club members. As a part of her position, Carolina employs a lot of _______________ communication. 1. Curt Contractor begins construction on an office building for Ace Company, and after 2 months demands an extra $50,000 on his contract. He tells Ace that, if does not agree to pay him the extra money, he will stop working. Ace, finding no one else to complete the work, agrees in writing to pay Curt the extra $50,000. Ace's agreement to pay that $50,000 is unenforceable. 2. Izzy is declared insane on Monday, and the next day she enters into a contract with Bob. This contract is voidable at Izzy's option. 3. Carol is employed as a custodian by Clothing Store. When she was hired, she signed a covenant not to compete for a period of 2 years, within 20 miles. Today she quit Clothing Store and immediately goes to work as custodian for a competitor that is located 2 miles away from Clothing Store -so Clothing Store sues her for breaching her promise not to compete. Clothing Store will not win this lawsuit. 4. Consideration in unilateral contracts normally consists of a promise in return for a promise. 5. Mindy Minor (age 16) buys a bike from Andy Adult. At age 17 1/2, Mindy calls Andy and says, "I really love this bike- I'm so glad 1 bought it!" On her 18 th birthday, Mindy calls Andy and says: "I've changed my mind, and I'm returning the bike. I want my money back." Under these circumstances Mindy can disafirim the contract. 6. A contract to perform an act made illegal after the formation of the contract cannot be enforced 7. "Because you were nice and helped me study for today's quiz, I promise to pay you $10 when I see you next week" is not a binding promise. 8. A contract made by an intoxicated person who has been drinking so much that he doesn't know what he's doing is void. 9. A transaction that is so one-sided that it "shocks the conscience" of the court will nevertheless be upheld if the parties knowingly and voluntarily consented to the agreement. 10. PSU Student Sally Smart likes to wear her pink shirt to class whenever she has the chanceshe really loves that shirt! Each day Sally sits in class next to PSU student Grouchy Greg, who happens to hate the color pink. One day half-way through the semester, Greg says to Sally, "Listen, I really dislike that pink shirt you frequently wear to class. If you promise me that you won't wear any pink clothes for the rest of the semester, I'll promise to give you $25." Sally agrees, and the two shake hands on the deal. Sally doesn't wear pink any more that semester, and after the last class she says to Greg, "OK, give me the $25." Under these circumstances Sally is legally entitled to collect $25 from Greg. Use the results of last Sunday's major league baseball scores to test the hypothesis that the average number of runs scored by winning teams is 5.6. Use the 5 percent level of significance. What does the title Harbor Me mean?