The script must define two classes
- Collectable
- Baseball_Card
Baseball_Card is a subclass of Collectable
Collectable
Collectable must have the following attributes
- type
- purchased
- price
All attributes must be hidden.
purchased and price must be stored as integers.
Collectable must have the following methods
- __init__
- get_type
- get_purchased
- get_price
- __str__
__str__ must return a string containing all attributes.
Baseball_Card
Baseball_Card must have the following attributes.
- player
- year
- company
All attributes must be hidden.
year and must be stored as an integer.
Baseball_Card must have the following methods
- __init__
- get_player
- get_year
- get_company
- __str__
__str__ must return a string containing all attributes.
Script for this assignment
Open an a text editor and create the file hw11.py.
You can use the editor built into IDLE or a program like Sublime.
Test Code
Your hw11.py file must contain the following test code at the bottom of the file:
col_1 = Collectable("Baseball card", 2018, 500)
print(col_1.get_type())
print(col_1.get_purchased())
print(col_1.get_price())
print(col_1)
bc_1 = Baseball_Card("Willie Mays", 1952, "Topps", 2018, 500)
print(bc_1.get_player())
print(bc_1.get_year())
print(bc_1.get_company())
print(bc_1)
Suggestions
Write this program in a step-by-step fashion using the technique of incremental development.
In other words, write a bit of code, test it, make whatever changes you need to get it working, and go on to the next step.
1. Create the file hw11.py.
Write the class header for Collectable.
Write the constructor for this class.
Copy the test code to the bottom of the script.
Comment out all line in the test code except the first.
You comment out a line by making # the first character on the line.
Run the script.
Fix any errors you find.
2. Create the methods get_type, get_purchased and get_price.
Uncomment the next three lines in the test code.
Run the script.
Fix any errors you find.
3. Create the __str__ method.
Uncomment the next line in the test code.
Run the script.
Fix any errors you find.
4. Write the class header for Baseball_Card.
Write the constructor for this class.
When you call the __init__ method for Collectable you will have to supply the string "Baseball card" as the second argument.
Uncomment the next line in the test code.
Run the script.
Fix any errors you find
5. Create the methods get_player, get_year and get_company.
Uncomment the next three lines in the test code.
Run the script.
Fix any errors you find.
6. Create the __str__ method.
Uncomment the last line in the test code.
Run the script.
Fix any errors you find.

Answers

Answer 1

Here's the script that defines the two classes, `Collectable` and `Baseball_Card`, according to the specifications provided:

```python

class Collectable:

   def __init__(self, type, purchased, price):

       self.__type = type

       self.__purchased = int(purchased)

       self.__price = int(price)

       

   def get_type(self):

       return self.__type

   

   def get_purchased(self):

       return self.__purchased

   

   def get_price(self):

       return self.__price

   

   def __str__(self):

       return f"Type: {self.__type}, Purchased: {self.__purchased}, Price: {self.__price}"

class Baseball_Card(Collectable):

   def __init__(self, player, year, company, purchased, price):

       super().__init__("Baseball card", purchased, price)

       self.__player = player

       self.__year = int(year)

       self.__company = company

       

   def get_player(self):

       return self.__player

   

   def get_year(self):

       return self.__year

   

   def get_company(self):

       return self.__company

   

   def __str__(self):

       collectable_info = super().__str__()

       return f"{collectable_info}, Player: {self.__player}, Year: {self.__year}, Company: {self.__company}"

# Test Code

col_1 = Collectable("Baseball card", 2018, 500)

print(col_1.get_type())

print(col_1.get_purchased())

print(col_1.get_price())

print(col_1)

bc_1 = Baseball_Card("Willie Mays", 1952, "Topps", 2018, 500)

print(bc_1.get_player())

print(bc_1.get_year())

print(bc_1.get_company())

print(bc_1)

```

Make sure to save this code in a file named `hw11.py`. You can then run the script to see the output of the test code.

To know more about python, click here:

https://brainly.com/question/30391554

#SPJ11


Related Questions

true or false a weighted inventory system is often tied into player advancement

Answers

Answer:tayfana

Explanation:true

PLS HELP!!
Flowchart and Algorithm is used to solve simple problems that does not have conditions

true or false???

Answers

On one side true and on the other side is false since the algorithm work differently depend on the data it input

Write a letter to your friend explaining about the geographical confitions of Nepal's hilly region​

Answers

I don’t know your friend so you should be able to answer

Answer:

I don't know............

Match the terms with their explanations.

Match the terms with their explanations.

Answers

Answer:

Zoom helps move the object of view further or closer

White Balance tells the camera what each color should look like

Shutter controls how long light enters the camera

focus provides sharper images by way of a ring at the front of the lens

Explanation:

Took photography classes

Select all that apply.
Select all elements that a piece of writing needs to be effectively organized.
an interesting title
a reference list
an interesting introduction
a clear, summarizing concluding paragraph
well-organized body paragraphs

Answers

Giving your reader a broad overview of the subject should be the first step.

Explain about the Clear introduction?

The topic should be focused in the center of the introduction so that your reader can see how it relates to your paper's overall goal.

Your beginning serves as a crucial guide for the remainder of your essay. Your introduction gives your viewers a lot of information. They can learn what your issue is, why it is significant, and how you intend to move the conversation along.

It should begin your essay and make the reader interested in what you have to say. When crafting a hook, stay away from generalising your arguments or utilising rambling, complex words. Start your essay with an exciting sentence that is easy to understand, succinct, and memorable.

To learn more about Clear introduction refer to:

https://brainly.com/question/15224091

#SPJ1

the episode about argos, odysseus' dog, is important to the overall plot of part 2 because it emphasizes

Answers

The episode about Argos emphasizes themes of loyalty, compassion, and the restoration of order, adding depth and emotional resonance to the plot of Part 2 of the Odyssey.

The episode about Argos, Odysseus' dog, is important to the overall plot of Part 2 of the Odyssey because it emphasizes several key themes and character traits.

Firstly, the episode highlights the theme of loyalty. Argos, despite his old age and neglect, recognizes Odysseus upon his return after 20 years and displays unwavering loyalty by wagging his tail and acknowledging his master's presence. This loyalty serves as a stark contrast to the behavior of the suitors, who have been disloyal and disrespectful to Odysseus and his household.

Secondly, the episode showcases Odysseus' humanity and emotional depth. Upon seeing Argos, he sheds a tear, knowing that his loyal companion has suffered during his absence. This moment of tenderness and compassion reveals Odysseus' love for his dog and his capacity for empathy.

Furthermore, the episode symbolizes the homecoming and restoration of Odysseus' kingdom. Argos' presence signifies that Odysseus has returned to his rightful place and that the disloyal suitors will soon face their consequences.

Overall, the episode about Argos emphasizes themes of loyalty, compassion, and the restoration of order, adding depth and emotional resonance to the plot of Part 2 of the Odyssey.

Learn more about Odyssey at: https://brainly.com/question/20695203

#SPJ11

Datawriter
Create a File object using "data.txt" as the argument to its constructor. Store the reference to the new File object in a variable of type File.
Will mark brainliest

Answers

Answer:

Explanation:

suppose that someone is creating a java source code file. the file contains more opening curly braces than closing curly braces. what will be the result?

Answers

If a Java source code file has more opening curly braces than closing curly braces, it will result in a compilation error indicating an "unclosed block" or "reached end of file while parsing" error. The code needs to be corrected by balancing the braces.

1. If a Java source code file contains more opening curly braces ({) than closing curly braces (}), it will result in a compilation error. The Java compiler will detect the mismatched braces and report an error indicating that the code has an "unclosed block" or "reached end of file while parsing" error.

2. The compilation error occurs because the Java compiler expects each opening curly brace to have a corresponding closing curly brace to properly define the code blocks. If there are more opening braces than closing braces, it means that one or more code blocks are not properly terminated, leading to an incomplete and syntactically incorrect code structure.

3. To fix this issue, the programmer should carefully review the code and ensure that each opening brace has a corresponding closing brace. It is important to maintain proper indentation and formatting to make it easier to identify and match the braces correctly. Using an integrated development environment (IDE) with code highlighting and brace matching features can also help detect and resolve such issues more easily.

To learn more about java visit :

https://brainly.com/question/31561197

#SPJ11

ou need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart. Which type of wireless antenna should you use on each side of the link

Answers

Answer:

High-gain and directional wireless antenna.

Explanation:

WiFi can be defined as a wireless local area network that allows network devices such as access points (APs), computers (both laptops and desktops), smartphones, smart televisions, etc., to communicate with each other wirelessly over a short-ranged network. It is a standard communication network that uses radio waves to establish a channel (medium) between multiple network devices.

This ultimately implies that, the network range or distance covered by WiFi is largely dependent on transmission power and frequency. Generally, the standard range or distance covered by WiFi is about 50 meters (160 feet).

Electromagnetic waves is a propagating medium used in all communications device to transmit data (messages) from the device of the sender to the device of the receiver through the use of an antenna.

In this scenario, you need to implement a wireless network link between two buildings on a college campus, which are 100 meters apart.

A high-gain antenna is an electromagnetic device that typically has a gain rating of 12dBi or sometimes higher. Also, a highly directional antenna can only receive radio signals from a specific direction and it compresses the radio waves that are being transmitted from a sender in to a very narrow beam.

Hence, the two (2) type of wireless antenna you should use on each side of the link are a high-gain antenna and a directional wireless antenna.

Takes a 3-letter String parameter. Returns true if the second and
third characters are “ix”

Python and using function

Answers

Answer:

def ix(s):

   return s[1:3]=="ix"

Explanation:

under the idea of friendly ai, ai machines would be designed so that they will benefit humans rather than harm them.T/F

Answers

True. Under the concept of Friendly AI, AI machines are designed to prioritize benefiting humans rather than causing harm to them. Friendly AI refers to the approach of designing artificial intelligence systems with the intention of ensuring they act in a way that is beneficial and aligned with human values.

The goal is to create AI systems that are friendly, cooperative, and have a positive impact on human well-being. The concept of Friendly AI acknowledges the potential risks associated with advanced artificial intelligence and aims to mitigate those risks by prioritizing the development of AI systems that prioritize human safety and welfare. This includes designing AI systems that are aligned with human values, exhibit ethical behavior, and work collaboratively with humans rather than posing a threat or harm. By focusing on Friendly AI, researchers and developers strive to create AI systems that can be trusted and relied upon to assist and enhance human capabilities, promoting a symbiotic relationship between humans and machines. The aim is to ensure that AI technologies are developed and utilized for the benefit and well-being of humanity as a whole.

Learn more about artificial intelligence here:

https://brainly.com/question/22678576

#SPJ11

what do we call goods that are no longer available once you have used them??​

Answers

Answer:

Either limited sources or extinct

Explanation:

Natural resources are things that can easily be replaced by nature. Limited resources are something that cannot be replaced by nature <33

Limited sources should be the answer

¿Hay hardware gratuito?

Answers

Answer:

no

Explanation:

which port numbers and packet types are relevant for allowing l2tp/ipsec through a firewall? (choose all that apply.)

Answers

Port numbers 1701 (UDP) and 500 (UDP) are relevant for allowing L2TP/IPsec through a firewall. The relevant packet types are ESP (protocol number 50) and AH (protocol number 51).

L2TP/IPsec is a commonly used VPN protocol, which encapsulates L2TP traffic within IPsec for added security. In order to allow L2TP/IPsec traffic through a firewall, the firewall needs to allow traffic on port number 1701 (UDP) for L2TP traffic, and port number 500 (UDP) for the Internet Key Exchange (IKE) protocol used in the IPsec negotiation process. Additionally, the firewall needs to allow the relevant IPsec protocols, which are Encapsulating Security Payload (ESP) and Authentication Header (AH). These protocols use protocol numbers 50 and 51, respectively. By allowing traffic on these ports and protocols, the firewall can properly handle L2TP/IPsec traffic and ensure that the VPN connection is established successfully.

learn more about port number here:

https://brainly.com/question/31041518

#SPJ11

Which statement about programming languages is true?

1) Lisp was designed for artificial intelligence research.
2) BASIC was the first high-level programming language.
3) FORTRAN was an early programming language designed for business use.
4) Pascal was the first programming language for personal computers.

Answers

Answer:

2

Explanation:

plz make me brainliest

Option A: Lisp was designed for artificial intelligence research.

The acronym Lisp stands for List Programming is a computer programming language developed about 1960 by John McCarthy.Lisp is the second-oldest high-level programming language which has a widespread use today.LISP has a very simple syntax in which a parenthesized list is used to give operations and their operands.This Language was designed for manipulating data strings with convenience.Lisp includes all the working as the function of any object.Lisp uses symbolic functions which are easy to use with AI applications.Originally Lisp was created as a practical mathematical notation used in computer programs.Lisp pioneered many revolutions in the field of computer science such as tree data structures, automatic storage management etc.

what is the kybert satellite

Answers

Answer:

i dont know....there is nothing on that piece of technology

Explanation:

This isn't academic, but what do I do if HI-REZ won't let me sign into an existing account. “Something went wrong” keeps popping up when I type in the correct info

Answers

Answer:

contact their support

Explanation:

Which process (also known as VizPortal) handles the web application, REST API calls, and supports browsing and searching?

Answers

The process you're referring to is Tableau Server's Application Server, also known as VizPortal.

This component handles the web application, manages REST API calls, and supports browsing and searching within the platform.

The process that handles web application, REST API calls, browsing, and searching in the context of SAP BusinessObjects is called the "SAP BusinessObjects Business Intelligence Platform Web Application Server" or simply "Web Application Server" (WAS).

WAS is part of the SAP BusinessObjects Business Intelligence Platform architecture and provides a central access point for web-based applications, services, and content.

It is also sometimes referred to as "VizPortal" in the context of SAP Lumira and SAP Analytics Cloud, which are products that leverage the Business Intelligence Platform.

WAS supports a wide range of features, including but not limited to: user authentication and authorization, web-based report and dashboard viewing and interaction, RESTful web services for programmatic access to platform features and content, and search and browse capabilities for finding and exploring platform content.

For similar question on  Tableau Server's.

https://brainly.com/question/28582084

#SPJ11

it is where your cpu (processor) is installed

it is where your cpu (processor) is installed

Answers

The motherboard (CPU SOCKET)

Answer:

OPTICAL DRIVE

Explanation:

It think

which of the following techniques can you use to navigate to the next record in a datasheet? select all the options that apply.
Create a database from a template.
Create a new blank database.
Open an existing database.

Answers

To navigate to the next record in a datasheet, you can use the following techniques: 1. Open an existing database.

When you open an existing database, you have access to the records stored in the datasheet. To navigate to the next record, you can either click on the next row in the datasheet view or use the navigation buttons located at the bottom of the datasheet window.

Creating a database from a template or creating a new blank database are not techniques used to navigate to the next record in a datasheet. They are, instead, methods for creating a new database.Out of the given options, only "Open an existing database" is a technique that you can use to navigate to the next record in a datasheet.

To know more about datasheet visit:

https://brainly.com/question/30457310

#SPJ11

If Charles wants to build a list of additional system user accounts, which of the vulnerabili-ties is most likely to deliver that information?
A. The Ruby on Rails vulnerability
B. The OpenSSH vulnerability
C. The MySQL vulnerability
D. Both the OpenSSH and MySQL vulnerabilities

Answers

The only vulnerability that indicates remote code execution specifically, which is how Charles would most likely access the system, is in Ruby on Rails.

What is vulnerability?A computer system's vulnerabilities are faults that reduce the system's overall security. Vulnerabilities are flaws in the hardware or the software that uses the hardware. In terms of security, a vulnerability is a flaw or opening that can be taken advantage of by hackers to enter a computer system without authorization. System weakened by vulnerabilities, which allow for malicious assaults. It's not the same thing to be vulnerable and under threat. An event or person poses a threat when they have the potential to negatively affect a valuable resource. A resource or its surroundings must possess a certain quality in order for a danger to materialise.

To learn more about vulnerability, refer to:

https://brainly.com/question/13138322

Option B. The OpenSSH vulnerability
If Charles wants to build a list of additional system user accounts, the most likely vulnerability to deliver that information would be the OpenSSH vulnerability.

The OpenSSH vulnerability could potentially allow an attacker to gain unauthorized access to the system and retrieve a list of user accounts. The Ruby on Rails vulnerability and the MySQL vulnerability are not directly related to user accounts and would not provide the same type of information. Option D, both OpenSSH and MySQL vulnerabilities, may provide additional information but the OpenSSH vulnerability would still be the most likely to provide a list of user accounts.

Learn more about SSH: https://brainly.com/question/28269727

#SPJ11

the it manager in your organization has asked you to install the pulseaudio-equalizer.noarch package. in this lab, your task is to install the pulseaudio-equalizer.noarch package.

Answers

Since you want to use DNF to Install an RPM Package Lab and your task is to install the pulseaudio-equalizer.noarch package, the way to do it is

Type dnf install pulseaudio-equalizer at the prompt. Enter after noarch. To install the package, press Y and then Enter.

What is in an RPM package?

Typical RPM packages come with relevant configuration files, documentation, and binary executables. The rpm program is a potent package manager that may be used to install, query, verify, update, wipe, and produce RPM-format software packages.

Hence, the Red Hat package manager uses files with the RPM file extension to store installation packages for Linux operating systems. Since they are "packed" in one location, these files offer a simple means for software to be disseminated, and others.

Learn more about RPM Package from

https://brainly.com/question/27961992
#SPJ1

See full question below

6.2.5 Use DNF to Install an RPM Package Lab

In this lab, your task is to install the pulseaudio-equalizer.noarch package.

Reggie is having trouble signing into his email account at work. He picks up the phone to call someone in IT, and then checks the phone list to see who to call. Which IT area should Reggie call

Answers

The IT area that Reggie should call is called; Information Security

What are the functions of an Information Technology Department?

The IT department that Reggie should call is called Information Security department.

This is because Information security protects sensitive information from unauthorized activities such as inspection, modification, recording, and any disruption or destruction.

The aim of this department is to make sure that the safety and privacy of critical data such as customer account details, financial data or intellectual property are safe.

Read more about information technology at; https://brainly.com/question/25920220

Explain the expression below
volume = 3.14 * (radius ** 2) * height

Answers

Answer:

Explanation:

Cylinder base area:

A = π·R²

Cylinder volume:

V = π·R²·h

π = 3.14

R - Cylinder base radius

h - Cylinder height

the niu (network interface unit) or nid (network interface device) at the isp's demarc serves what purpose?

Answers

Network interface device: The physical enclosure that links the HFC network to the nearby home wire is situated at the service endpoint.

What is network interface device ?

A network interface device (NID; also known by a number of other names) is a piece of equipment used in telecommunications to mark the boundary between the carrier's local loop and the customer's premises wiring. Outdoor telephone NIDs also give the subscriber access to the station wiring and act as an easy testing location for the subscriber's internal wiring and loop integrity.

An item of telecommunications equipment called a network interface device (NID; also known by a variety of other names) is used to delineate the space between the carrier's local loop and the customer's premises cabling. In addition to providing the subscriber with access to the station wire, outdoor telephone NIDs also serve as a convenient testing ground for the subscriber's internal wiring and loop integrity.

Learn to know more about network interface device :

https://brainly.com/question/1172216

#SPJ4

write the function named replace at index that takes a string and an integer. the function should return a new string that is the same as the old string, except with a dash in place of whatever character was at the index indicated by the integer.

Answers

The correct function is:def replace_at_index(str, number):

new = str.replace(str[number], "-")

return new

print(replace_at_index("eggplant", 3))

How to create replace at index function?

To create the replace at index function, which accepts a string and an integer.

- Create the new variable, which will contain the new string.

- Use the replace function to replace the character at the specified index with a dash. This method requires two parameters: the original character to be replaced and the replacement character.

- Give the new string back.

- Call the function with the necessary arguments.

Learn to know more about string:

https://brainly.com/question/4087119

#SPJ4

Examples of the many different ways an app can be used are called use

Answers

Answer:

Different Types of Application Software

Explanation:

Word Processing Software. This software enables users to create and edit documents. The most popular examples of this type of software are MS-Word, WordPad and Notepad among other text editors.

Database Software. Database is a structured collection of data. A computer database relies on database software to organize data and enable database users to perform database operations.

Spreadsheet Software. Excel, Lotus 1-2-3 and Apple Numbers are some examples of spreadsheet software. These software allow users to perform calculations using spreadsheets.

Hope this helped

Answer:

Different Types of Application Software

Explanation:

I hope this helps

Write a program that asks the user for a positive 3-digit number. Then print the number in reverse mathematically

Answers

number = int(input("Enter a positive 3-digit number: "))

firstDigit = number // 100

secondDigit = (number - (firstDigit * 100))//10

lastDigit = number - ((firstDigit * 100) + (secondDigit * 10))

newNum = (lastDigit*100) + (secondDigit*10) + firstDigit

print(newNum)

I think this is what you want

What does a good résumé help you do?
A. hide your contact details
B. emphasize your best skills and accomplishments
C. highlight only your most recent projects
D. highlight only your academic qualifications

Answers

Answer:

b, emphasize your best skills and accomplishments

Explanation:

think of an acting resume!!

What's the smallest part of a computer

A microchip

A byte

A bit

A mouse click

Answers

Answer:

A byte

Explanation:

I just had that question on my quiz

A byte!
It can be referring to any sort of byte according to the question. (kilobyte would be pretty small)
Other Questions
1.which of the following is a compound sentence. A. he will not run. B. I dont like to run or swim. C. swimming is extremely fun. D. he ran, but she ran faster. 2. Which of the folowing sentences correctly follow the rules of capitalization? A. Even though he moved to New York,he was born in a Western town. B. I plan to enroll in College next year. C. The Geography students took a class trip to Rocky Mountains. D. The A1 Plumbing Board of Directors gave every employee a raise. 3. which of the following sentence demonstrate correct grammar usage. A. if any less people watch that television series, the affect will be its cancellation. B. if any fewer people watch that television series, the affect will be its cancellation. C. if less people watch that television series, the effect will be its cancellation. D.. if fewer people watch that television series, the effect will be its cancellation4. which of the following sentence Is punctuated correctly? A. The young man yelled, Oh what a wonderful day to go see the seals.B. The young man asked, Have you read The Hobbit?c. The young man said, Its a nice day to take a walk in the park.D.The young man exclaimed,Wow,what fun we had today!5.The space between the ribs are known as --------- spaces. They contain the ------ veins. which of the following words is the best choice for the blanks in the sentence? A. intervenous. Intercostal. c. intravenous. D. intracostal6.which of the following is true about academic thesis? A.its directly states the argument. B. it is a viewpoint endorsed by ones professor. C. it reflects the opinion of most people. D. a reasonable argument cannot be made against it. how many people will hit 2 of 4 pitches out of 120 people? Point P is the midpoint of DEDP=6x +4, and DE = 141 - 10What is the length of DP?Enter your answer in the box.units Express the trig ratios as fractions in simplest termsHelp asap please!!!! the ratio of two numbers is 3 is to 7 if the smaller is 18 find the greater number HELP WILL GIVE BRAINLIST!! Emily and Tammy are planting vegetables in their garden. Emily is planting 81 tomato plants and Tamara is planting 54 corn plants. If each row of their garden has the same number of plants in them, what is the GREATEST number of plants in a row? What is the ratio of 1 1/2 hours to 50 minutes Solve each system of equations by GRAPHING. Clearly identify your solution.(5x + 2y = 4 (3x + 6y = -12) To host a party at a local restaurant ,you must pay $____to rent it and $___ per guest. Define pressure potential. 0.835 - 0.423Answers 0.5120.4120.4020.418 2.) A cannon is shot from a cliff with a velocity of 100m/s at 30 degrees. If the cliff is 50ft tall, A) How high is the cliff in meters? (2pts) B) How long is the ball in the air for? (t-?) (4pts) C) What is the maximum height the ball gets to? (record your height in meters) (3pts) D) How far horizontally does the ball travel from the base of the cliff? (2 pts) Test nhanh HP Ab nguyn l hot ng Given the solutions to a quadratic equation are x = 3 and x = 6 , write the equation, in standard form, that generates these answers. A line with the equation y = 2x +3 is dilated with the center of the dilation at the origin and a scale factor of 6. Ava believes the equation of the image line will be y=12x+4 while her friend Sarena believes the equation is y = 2x +18. Is one of them correct? If so, who is it and why? If not, why are they both wrong? What value, written as a decimal, should lena use as the common ratio? 1.0 1.5 2.5 2.0 the compound ccl4 contains question 16 options: a) nonpolar covalent bonds. b) polar covalent bonds, with partial negative charges on the cl atoms. c) ionic bonds. d) polar covalent bonds, with partial negative charges on the c atoms. How to tell if a graph is a function in algebra A rectangular garden is divided into four sections. Some dimensions are shown in the diagram, and the distance frompoint A to point Cis 16 ft.12 it815 ftWhat is the distance from point A to point B in feet?A. 8ft B.7ft c.9ft D.6ft