The function changeLocation is also called a _____.

class bike:
def __init__(self,size,idNum,color ):
self.size = size
self.location = 10
self.color = color
self.idNum = idNum

def changeLocation(self,newLocation):
self.location = newLocation


manipulator

initiator

method

constructor

Answers

Answer 1

Answer:

The answer is a method

Explanation:

Answer 2

Answer:

class and self

Explanation:

class Bike:

def __init__(self, str, float):

self.color = str

self.price = float


Related Questions

the basis of modern technology is traditional technology​

Answers

Answer:

A customized innovation is of specialized advances where some unique things are added to extend it. The present day advances have been based on the fundamental structures purposes and working of the traditional technologies.

Hence, it can be concluded that “The basis of modern technology is traditional technology”

Give five (5) words that describes about computer.​

Answers

multi-purpose
electronic
Accuracy
Speed
Diligence

Explanation:

C=Commonly

O=Operated

M=Machine

P=Particularly

U=Used for

T=Training

E=Education

R=Research

hope it helps you

africans are unique people they are rich culture and a glorious history​

Answers

Explanation:

In Africa art including crafts and culture, mythology and faith, clothes, lifestyle, music and tongues, African pixel is influenced. In Africa, social identities are plentiful, with vast quantities of multiculturalism being discovered not only through various continents, as well as within individual nations.

HELP
Question 1 (1 point)
GIF, JPG, and TIFF are raster-based.
O True
O False

Answers

It is true. GIF and JPG are mostly rasted (can be a vector), and TIIFF is rasted.

Unitary method question 1) If the cost of 32 copies is Rs 960, how much more cost is of 3 dozen copies ?​

Answers

Answer:

the cost of 3 dozen copies is Rs 1080.

Explanation:

32 copies =Rs 960

1 copy =Rs 960÷32

= Rs 30

3 dozen = 3 × 12. =36

36 copies = 36 × 30

= Rs 1080

While gaming online, Julian receives several insulting comments from another player. This is an example of
O denigration
O cyberstalking
harassment
O outing

Answers

Answer:

cyberstalking harassment

Explanation:

since Julian is being harrased or bullied online by someone

project members are called change agents. why?

Answers

A project members are called change agents because  they are people who have the skill as well as the capability and power to bring about, influence, facilitate, as well as coordinate the change effort.

What does being a change agent mean?

In regards to business, a change agent is known to be called any body be it a man or a woman that helps to  promotes as well as supports a new method of doing things inside of the company, even if it is the use of a new method, the taking in of a new management structure or the changing of an old business model to those of a new one.

Therefore, based on the above, A project members are called change agents because  they are people who have the skill as well as the capability and power to bring about, influence, facilitate, as well as coordinate the change effort.

Learn more about project members from

https://brainly.com/question/24248709
#SPJ1

What is included in a linked list node?

I a reference to the next node
II an array reference
III a data element

Answers

Answer: I a reference to the next node

III a data element

Explanation:

A linked list is simply referred to as a linear data structure, whereby the elements would not be stored at memory locations that are together in the sequence.

In simple words, we can simply say that a linked list is made up of nodes in which, every node has a data element and also a link or reference to the next node that is in the list.

Therefore, based on the explanation above, the correct option will be:

I. a reference to the next node

III a data element

PLZ PLZ PLZ PLZ HELP I ONLY HAVE 5 MINUTES IT SAYS THE SUBJECT IS COMPUTERS AND TECHNOLOGY BUT ITS ACTUALLY MEDIA LIT

Answers

Answer:

B

Explanation:

I think that is the right answer

Typically you will not find biometric devices in _________ security buildings. Low High Minimal Medium

Answers

Answer:

Low

Explanation:

Biometrics security systems are hardware scanners that are useful for capturing the biometric of individuals as a means of verifying identity. These scans would be matched against the saved database and in turn access would be approved or denied to the system. In other words, biometric security gives the human body the “key” to unlock your access into buildings.

You will not find such devices in low security buildings.

this is computer programming and it confuses me very much

Answers

Answer:

Using a loop or using the power function from a math library.

Explanation:

Really the question needs a bit more context. But if you want to calculate [tex]a^{b}[/tex]

and b is a whole number, you could create a loop with b steps and keep multiplying by a.

Alternatively, you can use a power function such as pow(a,b) from math.h in the C programming language.

how do i create a business process flow chart?

Answers

Answer:

Determine the main components of the process. ...

Order the activities. ...

Choose the correct symbols for each activity. ...

Make the connection between the activities. ...

Indicate the beginning and end of the process. ...

Review your business process diagram.

Explanation:

Database are pranized in
consist of a series of
which consist of a senes of​

Answers

Answer:

fields and records I guess is the answer

How is opera diffrerent from blues,gospel,and country music?

Answers

Answer: Opera has its roots in Europe; the other styles are American

Explanation:

Hoda wants to create a new presentation in PowerPoint with existing graphics and designs. What is the easiest and fastest way for her to do this? Use an existing template. Design a new theme for the presentation. Create a custom template for the presentation. Search for a design template online.

Answers

Answer:

The answer is A

Explanation:

Edge 2020

assembly language uses _____ coder for programming.

Answers

Answer:

Assembly language uses alphabetic codes in place of binary numbers used in machine language. assembly language code is converted into executable machine code by a utility program referred as assembler.

the acronym PC stands of​

Answers

Answer:

personal computer

Explanation:

It stands for personal computer

A document template is a___

preformatted structure for a document
read-only document
type of reference for a document
passcode assigned to access a hidden document

Answers

The remember good thing about you you know that I don’t know but I love the internet to you see you I don’t know how you are to document your

Which steps can you take to remove all the data you've just typed from a cell?
Click the cell, then press Delete.
Click Undo on the Quick Access Toolbar.
Click Cut on the Clipboard group.
Press Ctrl+Z.
Press Ctrl+Shift.

Answers

Explanation:

Ctrl+Z

Click and press Delete

Click Undo

What character, when used at the beginning of the constructor name in a class, makes the class variables have a scope limited to the function?

* (an asterisk)

# (a pound sign)

$ (a dollar sign)

_ (an underscore)

Answers

Answer:

_ (an underscore)

Explanation:

The underscore character.

__init_ and __str__ have double underscore characters at the beginning and end of the function name.

Correct answer edge 2020

Answer:

The answer to your question is _ (an underscore).

I hope this helps you out and I hope that you have a wonderful day.<3<3<3

Explanation:

To specify your preferred colors, fonts, and effects for a document, which of the following should be done?

1.Create custom theme fonts

2.Create custom theme

3.Create a custom paragraph style

4.Create a custom character style

Answers

Answer: crest custom theme

Explanation:

Answer:

crest custom theme

Explanation:

If the three operations were combined, O(logN) + O(N) * O(logN) + 1, the overall algorithm cost would be:________
A. O(N)
B. O(logN)
C. O(logN)+O(N)
D. O(NlogN)

Answers

Answer:

D. O(NlogN)

Explanation:

The computation of the overall algorithm cost is as follows:

Given that

O(logN) + O(N) × O(logN) + 1

In the case of complexity we considered the high order that dominates the other terms

Thus, that term would be  

O(N) × O(logN)

It could be rewrite as

O(NlogN)

Hence, the correct option is D.

All the other options are wrong

Answer:

D. O(NlogN)

Explanation:

the overall algorithm cost would be: O(NlogN).

Whose guidelines should you follow for the destruction of storage media such as thumb drives, Zip drives, and computers?

Answers

Answer:

Depends how bad you want to hide something. If the drive has previously been encrypted and the password hashed (like AES-256 with SHA-512 hashing), then deleting the content is enough since it will be slightly overridden and thus unusable. If it is not encrypted already, delete it, and override all your disk space with something. If you want it to die as a secrete 100%, burn it and pulverize it. Otherwise, if you want a quick method, use some real delete software.

a clearly stated objective that how program should work and how it respond to a error is called??

Answers

Answer:

A Problem statement

Explanation:

I hope this is right

The Internet began when a large company wanted to sell products online.

True
or
False

Answers

Answer:

True

Explanation:

Answer:

It would be true

Explanation:

8.3.9 Text to Binary Python

Answers

Using the knowledge in computational language in python it is possible to write a code that write the binary code

Writting the code:

#function that will convert the text to binary

def text_to_binary(text):

   #variable to store the converted binary value

   binary_text = ""

   #iterate for each character in the text

   for i in text:

       #get the ASCII value of that character

       ascii = ord(i)

       #call the function to get the value of the

       #current ascii number and append it to the

       #binary_text

       binary_text += decimal_to_binary(ascii)

   #return the final converted binary value

   return binary_text

def decimal_to_binary(decimal_value):

   binary_base = 2

   num_bits_desired = 8

   binary_value = str(bin(decimal_value))[2:]

   while len(binary_value) < num_bits_desired:

       binary_value = "0" + binary_value

   return binary_value

text = input("Input the string you would like to encode: ")

binary = text_to_binary(text)

print(binary)

See more about python at brainly.com/question/18502436

#SPJ1

select the correct answer​

Answers

Could you possibly get a clearer picture, and also the options for the answer?

Cyberbullying can negatively impact a victim’s
well-being.

Answers

Answer:

whats the questions

Explanation:

Answer:

Physical

Explanation:

took the test

The term structure, as it relates to programming, refers to the decisions you make to design your program to best meet its objective. Coral provides features to create clean, efficient code. How can the basic if/elseif/else control statements help meet structural design objectives in your code?

Answers

Answer:

Explanation:

if/elseif/else control statements help accomplish efficient code since it provides a condition. The program analyzes the code and determines if certain criteria are met, if so then it continues down a certain pre-defined path   which would be the most efficient path towards the main program objective. If these criteria are not met then the code would follow the next most efficient path. This is all controlled through if/elseif/else statements. They ultimately provide various options for reaching the final objective in an order of most efficient to least efficient.

Question # 1

Multiple Choice

What will be the output of the following program?

def average(a, b):

total = a + b

return total / 2


ave = average(7,11)

print("Total", total)

print ("Average", ave)



A. an error statement since total's scope is limited to the average function.
B. Total 18
​Average 9
C. Total18
​Average9
D. an error statement since average is a keyword.

Answers

Answer:

an error statement since total's scope is limited to the average function.

Explanation:

The scope of total is the function average. Code outside of the function does not have access to its value.

Correct answer edge 2020

Answer:

an error statement since total's scope is limited to the average function.

Explanation:

The scope of total is the function average. Code outside of the function does not have access to its value.

Correct answer edge 2020

Other Questions
Which of the following is not a key aspect of training and development, rather it is a focus of OD?Question 10 options:learning is the sole objective, such as a new skill, system, or proceduresystemic organizational change effortsprograms developed for large audiencesneeds assessment, course development, technology usage, and on-the-job training Through which olfaction mechanism does conditional taste aversion occur? Explain. someone please help me figure out how many significant figures are present During world war I, which countries were part of the Allied Powers and were part of the Central Powers Germany Russia Ottoman Empire France Great Britain Austro-Hungarian Empire Harmony, righteousness, courtesy, and wisdom are all values that are often attributed to -- 11. There are 8 fluid ounces in one cup. If youdouble the amount of fluid ounces, will theamount of cups also double? Write anargument that can be used to defend yoursolution. The author chooses to put paragraphs describing the current solar energy market beforeparagraphs detailing how America can be more involved.Which BEST explains why the author chooses to order the paragraphs in that way?ABDto spotlight the debate between America and foreign countries so that hislater claims seem less argumentativeto provide background information on what solar energy looks like acrossall continents so that he can help readers become more knowledgeableto establish the financial and technological competition among othercountries in solar energy so that his argument becomes more urgentto explain how much money has been invested in the solar energy field sothat he can convince Congress to spend less in the next budget cycleh how did the french respond when the colonies defeated the british at saratoga in the revolutionary war barry is going to post-secondary school for three years. should barry get a student loan or personal line of credit to pay for his education? why? What is the purpose of the corona radiata on the secondary oocyte? Things passed on from earlier generations are a people's true or false: firms should obey all the laws, including but not limited to labor, consumer protection, and the environment. Write formulas for each of the following ionic compounds1: aluminum iodide2: Silver oxide 3: potassium nitride 4: calcium phosphide 5: magnesium fluoride How to understand algebra 1 dot plots what influences patient-therapist interactions in musculoskeletal physical therapy? qualitative systematic review and meta-synthesis A theory will eventually become a law if there is enough evidence to support itTrue or False Snails and beetles have exoskeletons. Hypothesize the advantages and disadvantages of having an exoskeleton rather than a backbone. Explain your answer in one or two sentences.NOTE: i will edit your answers a little to avoid plagiarism and getting the answer wrong. based on the information provided in the passage, what would be the most effective way for a professor to teach a lecture and ensure that the material would be retained with minimal review after the class? Two spheres are made of the same metal and have the same radius, but one is hollow and the other is solid. The spheres are taken through the same temperature increase. Which sphere expands more?. An American worker can produce either 5 cars or 8 tons of grain a year. A Japanese worker can produce either 4 cars or 9 tons of grain a year. To keep things simple, assume that each country has 100 million workers.