1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ghella [55]
2 years ago
6

Can someone help me debug this please

Computers and Technology
1 answer:
Ludmilka [50]2 years ago
4 0
Based on what I’m seeing, It seems like in the string of line 11 you’ve put “What is your first item?” When it should be “What is you second item”.

Word of advice: It’s would be best if you write your consent variables in camel case. It’s helps with debugging and over all helps a reader easily understand what your coding.
You might be interested in
List and briefly describe the 3 types of software
erastovalidia [21]
1. A [disk cleanup] utility searches for and removes unnecessary files.
2. [Back-up] - allows users to copy selected files or an entire hard disk to another storage medium.
3. [Firefox] is a web browser- a platform, which is used to browse the information via the internet.
4 0
3 years ago
Jim maintains attendance records for his employees for the year. Row B includes the dates of attendance, and column A includes t
ahrayia [7]
To lock multiple rows (starting with row 1), select the row below the last row you want frozen, choose the View tab, and then click Freeze Panes. To lock multiple columns, select the column to the right of the last column you want frozen, choose the View tab, and then click Freeze Panes<span>.


I hope my answer has come to your help. Thank you for posting your question here in Brainly. We hope to answer more of your questions and inquiries soon. Have a nice day ahead!
</span>
4 0
4 years ago
Read 2 more answers
What are the methods of identifying publicly switched networks?
Sav [38]
I believe that the answer to the question provided above is that the <span> methods of identifying publicly switched networks is by locating the IP address if the source.</span>
Hope my answer would be a great help for you.    If you have more questions feel free to ask here at Brainly.

8 0
3 years ago
What is the primary reason that routing on the internet is redundant
Elena-2011 [213]

Most of the time rerouting on the internet is redundant because a router already does it automatically. For example if one path has a lot of traffic it with put the user on another path with less traffic but same destination.

<span />
4 0
3 years ago
What are the parts to an
bazaltina [42]

Answer:

B) recipient subject body signature

5 0
3 years ago
Other questions:
  • ¿como influye la tecnologia en su vida cotidiana?
    7·1 answer
  • Combination keys perform a function when held down in combination with another key. true or false
    9·1 answer
  • Where is the cell membrane located in cell that do not have cell wall
    7·2 answers
  • The position of a _____ is a nontechnical position responsible for defining and implementing consistent principles for setting d
    15·1 answer
  • American Standard Code for Information Interchange (ASCII) would be classified at which layer of the OSI Model?
    13·1 answer
  • Write a recursive method that returns the number of 1’s in the binary representation of N. Use the fact that this is equal to th
    9·1 answer
  • It's fill the gap homework
    7·1 answer
  • 15. Virus cannot infect files that are saved in i. USB ii. CD-ROMs iii. Memory card iv. All of them​
    14·2 answers
  • Which tabs are expandable and collapsible
    14·1 answer
  • Which type of service offers a preconfigured testing environment for application developers to create new software applications
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!