1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ghella [55]
2 years ago
6

Can someone help me debug this please

Computers and Technology
1 answer:
Ludmilka [50]2 years ago
4 0
Based on what I’m seeing, It seems like in the string of line 11 you’ve put “What is your first item?” When it should be “What is you second item”.

Word of advice: It’s would be best if you write your consent variables in camel case. It’s helps with debugging and over all helps a reader easily understand what your coding.
You might be interested in
In Windows, which menu allows you to view file characteristics?
Zielflug [23.3K]
A. View Menu
Hope this helps!!! 
6 0
3 years ago
"_____ devices improve memory by encoding items in a special way."
Rus_ich [418]
Mnemonic devices improve memory by encoding items in a special way. Mnemonic devices are used in order to help one to improve one's ability to remember a particular information. Its a memory technique that help one's brain to encode and recall important information.
7 0
3 years ago
1.Which of the serves as the basis for determining whether an object has moved or not?
Harrizon [31]

Answer:

1. b

2. c

3. b

4. d

5. a

(hope this helped)

4 0
2 years ago
Select the correct answer.
Dvinal [7]

Answer:

A

Explanation:

because when you make a presentation so you are already use technology

4 0
3 years ago
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
Other questions:
  • Marie uses a browser to visit a blog. What is the unique identifier of the blog?
    5·1 answer
  • This is not school related in anyway but. I used to play this videogame on my computer years ago, but i cannot remember the name
    13·2 answers
  • The very first thing I should type when creating a formula in excel is:
    15·2 answers
  • I need help!!!!
    13·2 answers
  • Ben pays his mobile bills, watches movies, and shops online using the Internet. Which internet activity does he perform?
    13·2 answers
  • What is a multipurpose network device?
    10·1 answer
  • What makes someone an expert? What potential issues are there with this?
    10·2 answers
  • Technical term of stealing personal information in social media.​
    5·1 answer
  • You were recently hired by a small start-up company. The company is in a small office and has several remote employees. You have
    15·1 answer
  • To find detailed information about the origin of an email message, look at the ________________.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!