1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Norma-Jean [14]
3 years ago
7

6. What are the arguments, pros and cons, for Python's use of indentation to specify compound statements in control statements

Computers and Technology
1 answer:
Nat2105 [25]3 years ago
5 0

Answer:

beinggreat78~here~to~help.

In some cases, one con is that it can be hard to keep track of your identation when coding long lines or blocks. The pro is that you may need to learn, which is not a bad thing. Learning is good.

You might be interested in
4.
marshall27 [118]

Answer: c

Explanation:

5 0
3 years ago
Which of the following devices electronically sorts mail by ZIP code?
irina [24]
The answer is OCR or optical character reader.
This device is used to electronically sorts mails by zip code.
This device reads texts from the papers or documents, images and pdf files,  and then convert it into editable file.
7 0
3 years ago
Technician A says that using 100% coolant is better for freeze protection in an engine than a mixture with water. Technician B s
Levart [38]

Answer:

Technician B is right.

Explanation:

Generally speaking, most engines use a mixture of 50/50 coolant and water.

This is ideal in places where the weather never gets too extreme, and temperatures rarely go below 0 degrees. Using 100% antifreeze or coolant in any engine is not recommended since this doesn't have the same ability as water to transfer heat to or from the engine. Antifreeze is used to lower the freezing point of water, and it is water itself that does the job of keeping engine temperatures safe.

4 0
3 years ago
What is true about music from the Romantic period?
avanturin [10]
The answer to the given question above is the third option: <span>It was longer and less constrained than the music of the Classical period. The Romantic Period in music actually has more freedom in design and form. During this period, music were even more artistic and intellectual as well. Romantic Period occurred the late 18th century until early 19th century.</span>
8 0
3 years ago
Read 2 more answers
4. Interaction between seller and buyer is called___.
andrey2020 [161]

Answer:

C. Transactions.

Explanation:

A transaction can be defined as a business process which typically involves the interchange of goods, financial assets, services and money between a seller and a buyer.

This ultimately implies that, any interaction between a seller and a buyer is called transactions.

For example, when a buyer (consumer) pays $5000 to purchase a brand new automobile from XYZ automobile and retail stores, this is referred to as a transaction.

Hence, a transaction is considered to have happened when it's measurable in terms of an amount of money (price) set by the seller.

Price can be defined as the amount of money that is required to be paid by a buyer (customer) to a seller (producer) in order to acquire goods and services. Thus, it refers to the amount of money a customer or consumer buying goods and services are willing to pay for the goods and services being offered. Also, the price of goods and services are primarily being set by the seller or service provider.

5 0
4 years ago
Other questions:
  • Which step of creating a financial budget involves listing the payroll, rental, and utility costs?
    10·2 answers
  • Jason is an aspiring filmmaker. He manages finance and makes sure that everyone is involved in the project. Which role is Jason
    12·1 answer
  • Which of these components is a part of the central processing unit (cpu) of a computer??
    14·1 answer
  • Call 334-399-4201 to annoyed my mom
    13·1 answer
  • Passwords are usually alphanumeric and usually cannot contain spaces or ________.
    10·2 answers
  • Write only in C, not C++.
    14·1 answer
  • If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo
    11·2 answers
  • if anyone could help me with this it would be great. I have to turn in a practice resume and im completely lost and have no clue
    7·1 answer
  • When do you use an else statement for coding
    6·1 answer
  • Please help me I am crying because I don't know
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!