1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ghella [55]
2 years ago
6

Can someone help me debug this please

Computers and Technology
1 answer:
Ludmilka [50]2 years ago
4 0
Based on what I’m seeing, It seems like in the string of line 11 you’ve put “What is your first item?” When it should be “What is you second item”.

Word of advice: It’s would be best if you write your consent variables in camel case. It’s helps with debugging and over all helps a reader easily understand what your coding.
You might be interested in
(I'm sorry that this question isn't school related, I can't find answers anywhere else)
Juliette [100K]
Because you have to explain how you got it
3 0
2 years ago
Please help Ill give you brainliest if I get 2 answers. Which is used to input information on a laptop?
Ivanshal [37]

Answer:

c

Explanation:

7 0
2 years ago
in a stop-and-wait arq system, the bandwidth of the line is 1 mbps, and 1 bit takes 10 ms to make a round trip. if the system da
MArishka [77]

Answer:

٢٣٤

Explanation:

5 0
2 years ago
Explain three specific & major security threats to internet users. In each case, address whether or not the vulnerabilities
kherson [118]

Answer:

See explaination

Explanation:

We already know that people all over the world are using the internet to communicate with each other to store their personal data, for the entrainment working in internet, doing online shopping and a lot of things. The user can faced with many threats. These threats are of different form.

The listed and explained below are some of the threats;

a) Compromised browser:-

Most popular browser are targeted and any security flaws exploited immediately. Criminals uses the flaws to gain access to sensitive document and shadow users browsing activity.

Phishing:-

Phishing is simply referring to the spam email or websites. Most times it is used to steal ones data, identity and funds. It looks genuine, this is what makes it hard to detect .

Poisoned websites:-

These are the fake link with hidden malware where the malware creator create a juicy news /video link which attract the user but the destination affect the PCs and the PC give a big virus alert and then compelled a visitor to be aware of the malware.

Misused social media sites:- These are often used in work place these are misused to spread Trojans and malware User download file and put the corporate network at risk .

These threats are not meaningful to the internet of Things (IOT) but there are different things like if you have a CCTV camera and it is connected to internet so by the threads anyone can take control over the cameras it can shut down the camera delete the recording of the camera and other things. There are the other threats.

7 0
3 years ago
A model is replica that?
Ratling [72]

Answer:

shows the costumer or buyer how the product looks

3 0
2 years ago
Read 2 more answers
Other questions:
  • Which network could NOT carry commercial traffic?
    5·1 answer
  • The part of the computer that provides access to the internet is the?
    14·1 answer
  • Which of the following is the main consideration when choosing an appropriate outlet box?
    7·2 answers
  • Complete the following statement: Sustainability is: Choose all that apply.This task contains the radio buttons and checkboxes f
    10·1 answer
  • A franchise restaurant is attempting to understand if customers think their service is good day-to-day by summarizing a series o
    10·1 answer
  • _____ involves storing data and running applications outside the company’s firewall. answer grid computing parallel computing cl
    11·1 answer
  • Trong ửod muốn trình bày dạng cột càn thực hiện lệnh nào
    13·1 answer
  • Learning Task 3: Write the safety requirement indicated in each number on a
    15·1 answer
  • I want to get an output picture in python but it says this. I'm using turtle
    12·1 answer
  • when I turn on my pc using a graphics card, it does give video, and everything is normal, but when I try to turn on my pc with t
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!