1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesantik [10]
2 years ago
15

100 POINTS FOR ANYONE WHO CAN DO THIS!

Computers and Technology
1 answer:
Nataly [62]2 years ago
4 0

Let's check what can be modified

Before calling def we need adjective and conjunctions stored inside variables

Store them(You may change according to your choice)

\tt adjectives=("foolish","bad","long","hard")

\tt conjunctions=("and","but","for","after")

We have to make optional ,easy way ask the user to do instead of yourself .

\tt con=input("Enter\: yes\: if \:you \:want \:to \:use \:conjunctions:")

\tt adj=input("Enter\:yes\:if\:you\:want\:to\:use\: adjectives:")

If they click then we can proceed else no problem let the program run

\tt def\: conjunctionPhrase():

\quad\tt if\: con=="yes":

\quad\quad\tt return\:random.choice(conjunctions)+"\:"+nounPhrase()

\quad\tt else:

\quad\quad\tt continue

  • You may use pass also

\tt def\: adjectivePhrase():

\quad\tt if\:adj=="yes":

\quad\quad\tt return\:random.choice(adjectives)+"\:"+nounPhrase()

\quad\tt else:

\quad\quad\tt continue

You might be interested in
Which is a method used to determine database requirement?
Ivahew [28]

Answer:

I think it would be A, good luck!

8 0
3 years ago
Suppose you are the security manager of a company and one of your goals is to design security mechanisms based on three security
Tcecarenko [31]

Answer:

(i) Prevention is more important than detection and recovery.

(ii) Detection is more important than prevention and recovery.

(iii) Recovery is more important than prevention and detection.

Explanation:

(i) Prevention is more important than detection and recovery.

Prevention of attack can be through various applications for example a walk through gates are placed in order to prevent any attacker from entering the premises and causing harm.

(ii) Detection is more important than prevention and recovery.

Detection of an attack can be done through for example a security alarm can detect an attack and inform others.

(iii) Recovery is more important than prevention and detection.

Recovery of an attack can be done by for example an insurance which will recover a portion of loss occurred during the attack.

8 0
3 years ago
Which methods can you use to migrate user settings from windows 8.1 to windows 10?
seropon [69]

Windows Easy Transfer is used  to migrate user settings from windows 8.1 to windows 10,.

<h3>What is Windows Easy Transfer?</h3>

Windows Easy Transfer exists as a specialized file transfer program developed by Microsoft that permits users of the Windows operating system to transfer personal files and locations from a computer running an earlier version of Windows to a computer running a newer version.

The Windows Easy Transfer utility can be utilized to back up data from a computer before completing an upgrade or clean install of the Windows 8 operating system and then restore the data to the computer after the Windows 8 operating system exists installed.

Hence, Use Windows Easy Transfer. Copy the user profile from the old computer to the new computer. Complete an upgrade over the top of the old operating system. utilize the User State Migration Toolkit.

To learn more about Windows Easy Transfer refer to:

https://brainly.in/question/2787534

#SPJ4

7 0
2 years ago
How do you make an app for help
timama [110]
If you have a iPhone say "108" to Siri it will auto make an app
5 0
3 years ago
Read 2 more answers
Harry needs to make a presentation on endangered species of animals. Which presentation software elements can he use to display
antiseptic1488 [7]
I Think The answer is either b or d
4 0
3 years ago
Other questions:
  • A U.S. social security number consists of a string of 9 digits, such as "444422333". Declare a char array named ssn suitable for
    5·1 answer
  • How to check what level you are in runescape?
    9·2 answers
  • Need help with this​
    5·1 answer
  • "Why learning how to type is so important.
    7·1 answer
  • Images, symbols, and diagrams are types of
    12·1 answer
  • Which of the following best describes contextual design?
    10·1 answer
  • What is the most complex part of a PC?
    6·1 answer
  • Write A Code In Python
    8·2 answers
  • PLEASE HELP! I accidently looked up a link, and now this same link keeps popping up everywhere, how do I stop this!?!? please he
    13·2 answers
  • As a technical support rep, michael is responding to a customer's question sent to him via e-mail. what should michael's first t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!