Here's the script that defines the two classes, `Collectable` and `Baseball_Card`, according to the specifications provided:
```python
class Collectable:
def __init__(self, type, purchased, price):
self.__type = type
self.__purchased = int(purchased)
self.__price = int(price)
def get_type(self):
return self.__type
def get_purchased(self):
return self.__purchased
def get_price(self):
return self.__price
def __str__(self):
return f"Type: {self.__type}, Purchased: {self.__purchased}, Price: {self.__price}"
class Baseball_Card(Collectable):
def __init__(self, player, year, company, purchased, price):
super().__init__("Baseball card", purchased, price)
self.__player = player
self.__year = int(year)
self.__company = company
def get_player(self):
return self.__player
def get_year(self):
return self.__year
def get_company(self):
return self.__company
def __str__(self):
collectable_info = super().__str__()
return f"{collectable_info}, Player: {self.__player}, Year: {self.__year}, Company: {self.__company}"
# Test Code
col_1 = Collectable("Baseball card", 2018, 500)
print(col_1.get_type())
print(col_1.get_purchased())
print(col_1.get_price())
print(col_1)
bc_1 = Baseball_Card("Willie Mays", 1952, "Topps", 2018, 500)
print(bc_1.get_player())
print(bc_1.get_year())
print(bc_1.get_company())
print(bc_1)
```
Make sure to save this code in a file named `hw11.py`. You can then run the script to see the output of the test code.
To know more about python, click here:
https://brainly.com/question/30391554
#SPJ11
true or false a weighted inventory system is often tied into player advancement
Answer:tayfana
Explanation:true
PLS HELP!!
Flowchart and Algorithm is used to solve simple problems that does not have conditions
true or false???
On one side true and on the other side is false since the algorithm work differently depend on the data it input
Write a letter to your friend explaining about the geographical confitions of Nepal's hilly region
Answer:
I don't know............
Match the terms with their explanations.
Answer:
Zoom helps move the object of view further or closer
White Balance tells the camera what each color should look like
Shutter controls how long light enters the camera
focus provides sharper images by way of a ring at the front of the lens
Explanation:
Took photography classes
Select all that apply.
Select all elements that a piece of writing needs to be effectively organized.
an interesting title
a reference list
an interesting introduction
a clear, summarizing concluding paragraph
well-organized body paragraphs
Giving your reader a broad overview of the subject should be the first step.
Explain about the Clear introduction?
The topic should be focused in the center of the introduction so that your reader can see how it relates to your paper's overall goal.
Your beginning serves as a crucial guide for the remainder of your essay. Your introduction gives your viewers a lot of information. They can learn what your issue is, why it is significant, and how you intend to move the conversation along.
It should begin your essay and make the reader interested in what you have to say. When crafting a hook, stay away from generalising your arguments or utilising rambling, complex words. Start your essay with an exciting sentence that is easy to understand, succinct, and memorable.
To learn more about Clear introduction refer to:
https://brainly.com/question/15224091
#SPJ1
the episode about argos, odysseus' dog, is important to the overall plot of part 2 because it emphasizes
The episode about Argos emphasizes themes of loyalty, compassion, and the restoration of order, adding depth and emotional resonance to the plot of Part 2 of the Odyssey.
The episode about Argos, Odysseus' dog, is important to the overall plot of Part 2 of the Odyssey because it emphasizes several key themes and character traits.
Firstly, the episode highlights the theme of loyalty. Argos, despite his old age and neglect, recognizes Odysseus upon his return after 20 years and displays unwavering loyalty by wagging his tail and acknowledging his master's presence. This loyalty serves as a stark contrast to the behavior of the suitors, who have been disloyal and disrespectful to Odysseus and his household.
Secondly, the episode showcases Odysseus' humanity and emotional depth. Upon seeing Argos, he sheds a tear, knowing that his loyal companion has suffered during his absence. This moment of tenderness and compassion reveals Odysseus' love for his dog and his capacity for empathy.
Furthermore, the episode symbolizes the homecoming and restoration of Odysseus' kingdom. Argos' presence signifies that Odysseus has returned to his rightful place and that the disloyal suitors will soon face their consequences.
Overall, the episode about Argos emphasizes themes of loyalty, compassion, and the restoration of order, adding depth and emotional resonance to the plot of Part 2 of the Odyssey.
Learn more about Odyssey at: https://brainly.com/question/20695203
#SPJ11
Datawriter
Create a File object using "data.txt" as the argument to its constructor. Store the reference to the new File object in a variable of type File.
Will mark brainliest
Answer:
Explanation:
suppose that someone is creating a java source code file. the file contains more opening curly braces than closing curly braces. what will be the result?
If a Java source code file has more opening curly braces than closing curly braces, it will result in a compilation error indicating an "unclosed block" or "reached end of file while parsing" error. The code needs to be corrected by balancing the braces.
1. If a Java source code file contains more opening curly braces ({) than closing curly braces (}), it will result in a compilation error. The Java compiler will detect the mismatched braces and report an error indicating that the code has an "unclosed block" or "reached end of file while parsing" error.
2. The compilation error occurs because the Java compiler expects each opening curly brace to have a corresponding closing curly brace to properly define the code blocks. If there are more opening braces than closing braces, it means that one or more code blocks are not properly terminated, leading to an incomplete and syntactically incorrect code structure.
3. To fix this issue, the programmer should carefully review the code and ensure that each opening brace has a corresponding closing brace. It is important to maintain proper indentation and formatting to make it easier to identify and match the braces correctly. Using an integrated development environment (IDE) with code highlighting and brace matching features can also help detect and resolve such issues more easily.
To learn more about java visit :
https://brainly.com/question/31561197
#SPJ11
ou need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart. Which type of wireless antenna should you use on each side of the link
Answer:
High-gain and directional wireless antenna.
Explanation:
WiFi can be defined as a wireless local area network that allows network devices such as access points (APs), computers (both laptops and desktops), smartphones, smart televisions, etc., to communicate with each other wirelessly over a short-ranged network. It is a standard communication network that uses radio waves to establish a channel (medium) between multiple network devices.
This ultimately implies that, the network range or distance covered by WiFi is largely dependent on transmission power and frequency. Generally, the standard range or distance covered by WiFi is about 50 meters (160 feet).
Electromagnetic waves is a propagating medium used in all communications device to transmit data (messages) from the device of the sender to the device of the receiver through the use of an antenna.
In this scenario, you need to implement a wireless network link between two buildings on a college campus, which are 100 meters apart.
A high-gain antenna is an electromagnetic device that typically has a gain rating of 12dBi or sometimes higher. Also, a highly directional antenna can only receive radio signals from a specific direction and it compresses the radio waves that are being transmitted from a sender in to a very narrow beam.
Hence, the two (2) type of wireless antenna you should use on each side of the link are a high-gain antenna and a directional wireless antenna.
Takes a 3-letter String parameter. Returns true if the second and
third characters are “ix”
Python and using function
Answer:
def ix(s):
return s[1:3]=="ix"
Explanation:
under the idea of friendly ai, ai machines would be designed so that they will benefit humans rather than harm them.T/F
True. Under the concept of Friendly AI, AI machines are designed to prioritize benefiting humans rather than causing harm to them. Friendly AI refers to the approach of designing artificial intelligence systems with the intention of ensuring they act in a way that is beneficial and aligned with human values.
The goal is to create AI systems that are friendly, cooperative, and have a positive impact on human well-being. The concept of Friendly AI acknowledges the potential risks associated with advanced artificial intelligence and aims to mitigate those risks by prioritizing the development of AI systems that prioritize human safety and welfare. This includes designing AI systems that are aligned with human values, exhibit ethical behavior, and work collaboratively with humans rather than posing a threat or harm. By focusing on Friendly AI, researchers and developers strive to create AI systems that can be trusted and relied upon to assist and enhance human capabilities, promoting a symbiotic relationship between humans and machines. The aim is to ensure that AI technologies are developed and utilized for the benefit and well-being of humanity as a whole.
Learn more about artificial intelligence here:
https://brainly.com/question/22678576
#SPJ11
what do we call goods that are no longer available once you have used them??
Answer:
Either limited sources or extinct
Explanation:
Natural resources are things that can easily be replaced by nature. Limited resources are something that cannot be replaced by nature <33
¿Hay hardware gratuito?
Answer:
no
Explanation:
which port numbers and packet types are relevant for allowing l2tp/ipsec through a firewall? (choose all that apply.)
Port numbers 1701 (UDP) and 500 (UDP) are relevant for allowing L2TP/IPsec through a firewall. The relevant packet types are ESP (protocol number 50) and AH (protocol number 51).
L2TP/IPsec is a commonly used VPN protocol, which encapsulates L2TP traffic within IPsec for added security. In order to allow L2TP/IPsec traffic through a firewall, the firewall needs to allow traffic on port number 1701 (UDP) for L2TP traffic, and port number 500 (UDP) for the Internet Key Exchange (IKE) protocol used in the IPsec negotiation process. Additionally, the firewall needs to allow the relevant IPsec protocols, which are Encapsulating Security Payload (ESP) and Authentication Header (AH). These protocols use protocol numbers 50 and 51, respectively. By allowing traffic on these ports and protocols, the firewall can properly handle L2TP/IPsec traffic and ensure that the VPN connection is established successfully.
learn more about port number here:
https://brainly.com/question/31041518
#SPJ11
Which statement about programming languages is true?
1) Lisp was designed for artificial intelligence research.
2) BASIC was the first high-level programming language.
3) FORTRAN was an early programming language designed for business use.
4) Pascal was the first programming language for personal computers.
Answer:
2
Explanation:
plz make me brainliest
Option A: Lisp was designed for artificial intelligence research.
The acronym Lisp stands for List Programming is a computer programming language developed about 1960 by John McCarthy.Lisp is the second-oldest high-level programming language which has a widespread use today.LISP has a very simple syntax in which a parenthesized list is used to give operations and their operands.This Language was designed for manipulating data strings with convenience.Lisp includes all the working as the function of any object.Lisp uses symbolic functions which are easy to use with AI applications.Originally Lisp was created as a practical mathematical notation used in computer programs.Lisp pioneered many revolutions in the field of computer science such as tree data structures, automatic storage management etc.
what is the kybert satellite
Answer:
i dont know....there is nothing on that piece of technology
Explanation:
This isn't academic, but what do I do if HI-REZ won't let me sign into an existing account. “Something went wrong” keeps popping up when I type in the correct info
Answer:
contact their support
Explanation:
Which process (also known as VizPortal) handles the web application, REST API calls, and supports browsing and searching?
The process you're referring to is Tableau Server's Application Server, also known as VizPortal.
This component handles the web application, manages REST API calls, and supports browsing and searching within the platform.
The process that handles web application, REST API calls, browsing, and searching in the context of SAP BusinessObjects is called the "SAP BusinessObjects Business Intelligence Platform Web Application Server" or simply "Web Application Server" (WAS).
WAS is part of the SAP BusinessObjects Business Intelligence Platform architecture and provides a central access point for web-based applications, services, and content.
It is also sometimes referred to as "VizPortal" in the context of SAP Lumira and SAP Analytics Cloud, which are products that leverage the Business Intelligence Platform.
WAS supports a wide range of features, including but not limited to: user authentication and authorization, web-based report and dashboard viewing and interaction, RESTful web services for programmatic access to platform features and content, and search and browse capabilities for finding and exploring platform content.
For similar question on Tableau Server's.
https://brainly.com/question/28582084
#SPJ11
it is where your cpu (processor) is installed
Answer:
OPTICAL DRIVE
Explanation:
It think
which of the following techniques can you use to navigate to the next record in a datasheet? select all the options that apply.
Create a database from a template.
Create a new blank database.
Open an existing database.
To navigate to the next record in a datasheet, you can use the following techniques: 1. Open an existing database.
When you open an existing database, you have access to the records stored in the datasheet. To navigate to the next record, you can either click on the next row in the datasheet view or use the navigation buttons located at the bottom of the datasheet window.
To know more about datasheet visit:
https://brainly.com/question/30457310
#SPJ11
If Charles wants to build a list of additional system user accounts, which of the vulnerabili-ties is most likely to deliver that information?
A. The Ruby on Rails vulnerability
B. The OpenSSH vulnerability
C. The MySQL vulnerability
D. Both the OpenSSH and MySQL vulnerabilities
The only vulnerability that indicates remote code execution specifically, which is how Charles would most likely access the system, is in Ruby on Rails.
What is vulnerability?A computer system's vulnerabilities are faults that reduce the system's overall security. Vulnerabilities are flaws in the hardware or the software that uses the hardware. In terms of security, a vulnerability is a flaw or opening that can be taken advantage of by hackers to enter a computer system without authorization. System weakened by vulnerabilities, which allow for malicious assaults. It's not the same thing to be vulnerable and under threat. An event or person poses a threat when they have the potential to negatively affect a valuable resource. A resource or its surroundings must possess a certain quality in order for a danger to materialise.To learn more about vulnerability, refer to:
https://brainly.com/question/13138322
Option B. The OpenSSH vulnerability
If Charles wants to build a list of additional system user accounts, the most likely vulnerability to deliver that information would be the OpenSSH vulnerability.
The OpenSSH vulnerability could potentially allow an attacker to gain unauthorized access to the system and retrieve a list of user accounts. The Ruby on Rails vulnerability and the MySQL vulnerability are not directly related to user accounts and would not provide the same type of information. Option D, both OpenSSH and MySQL vulnerabilities, may provide additional information but the OpenSSH vulnerability would still be the most likely to provide a list of user accounts.
Learn more about SSH: https://brainly.com/question/28269727
#SPJ11
the it manager in your organization has asked you to install the pulseaudio-equalizer.noarch package. in this lab, your task is to install the pulseaudio-equalizer.noarch package.
Since you want to use DNF to Install an RPM Package Lab and your task is to install the pulseaudio-equalizer.noarch package, the way to do it is
Type dnf install pulseaudio-equalizer at the prompt. Enter after noarch. To install the package, press Y and then Enter.What is in an RPM package?Typical RPM packages come with relevant configuration files, documentation, and binary executables. The rpm program is a potent package manager that may be used to install, query, verify, update, wipe, and produce RPM-format software packages.
Hence, the Red Hat package manager uses files with the RPM file extension to store installation packages for Linux operating systems. Since they are "packed" in one location, these files offer a simple means for software to be disseminated, and others.
Learn more about RPM Package from
https://brainly.com/question/27961992
#SPJ1
See full question below
6.2.5 Use DNF to Install an RPM Package Lab
In this lab, your task is to install the pulseaudio-equalizer.noarch package.
Reggie is having trouble signing into his email account at work. He picks up the phone to call someone in IT, and then checks the phone list to see who to call. Which IT area should Reggie call
The IT area that Reggie should call is called; Information Security
What are the functions of an Information Technology Department?The IT department that Reggie should call is called Information Security department.
This is because Information security protects sensitive information from unauthorized activities such as inspection, modification, recording, and any disruption or destruction.
The aim of this department is to make sure that the safety and privacy of critical data such as customer account details, financial data or intellectual property are safe.
Read more about information technology at; https://brainly.com/question/25920220
Explain the expression below
volume = 3.14 * (radius ** 2) * height
Answer:
Explanation:
Cylinder base area:
A = π·R²
Cylinder volume:
V = π·R²·h
π = 3.14
R - Cylinder base radius
h - Cylinder height
the niu (network interface unit) or nid (network interface device) at the isp's demarc serves what purpose?
Network interface device: The physical enclosure that links the HFC network to the nearby home wire is situated at the service endpoint.
What is network interface device ?A network interface device (NID; also known by a number of other names) is a piece of equipment used in telecommunications to mark the boundary between the carrier's local loop and the customer's premises wiring. Outdoor telephone NIDs also give the subscriber access to the station wiring and act as an easy testing location for the subscriber's internal wiring and loop integrity.
An item of telecommunications equipment called a network interface device (NID; also known by a variety of other names) is used to delineate the space between the carrier's local loop and the customer's premises cabling. In addition to providing the subscriber with access to the station wire, outdoor telephone NIDs also serve as a convenient testing ground for the subscriber's internal wiring and loop integrity.
Learn to know more about network interface device :
https://brainly.com/question/1172216
#SPJ4
write the function named replace at index that takes a string and an integer. the function should return a new string that is the same as the old string, except with a dash in place of whatever character was at the index indicated by the integer.
The correct function is:def replace_at_index(str, number):
new = str.replace(str[number], "-")
return new
print(replace_at_index("eggplant", 3))
How to create replace at index function?To create the replace at index function, which accepts a string and an integer.
- Create the new variable, which will contain the new string.
- Use the replace function to replace the character at the specified index with a dash. This method requires two parameters: the original character to be replaced and the replacement character.
- Give the new string back.
- Call the function with the necessary arguments.
Learn to know more about string:
https://brainly.com/question/4087119
#SPJ4
Examples of the many different ways an app can be used are called use
Answer:
Different Types of Application Software
Explanation:
Word Processing Software. This software enables users to create and edit documents. The most popular examples of this type of software are MS-Word, WordPad and Notepad among other text editors.
Database Software. Database is a structured collection of data. A computer database relies on database software to organize data and enable database users to perform database operations.
Spreadsheet Software. Excel, Lotus 1-2-3 and Apple Numbers are some examples of spreadsheet software. These software allow users to perform calculations using spreadsheets.
Hope this helped
Answer:
Different Types of Application Software
Explanation:
I hope this helps
Write a program that asks the user for a positive 3-digit number. Then print the number in reverse mathematically
number = int(input("Enter a positive 3-digit number: "))
firstDigit = number // 100
secondDigit = (number - (firstDigit * 100))//10
lastDigit = number - ((firstDigit * 100) + (secondDigit * 10))
newNum = (lastDigit*100) + (secondDigit*10) + firstDigit
print(newNum)
I think this is what you want
What does a good résumé help you do?
A. hide your contact details
B. emphasize your best skills and accomplishments
C. highlight only your most recent projects
D. highlight only your academic qualifications
Answer:
b, emphasize your best skills and accomplishments
Explanation:
think of an acting resume!!
What's the smallest part of a computer
A microchip
A byte
A bit
A mouse click
Answer:
A byte
Explanation:
I just had that question on my quiz