1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ghella [55]
2 years ago
6

Can someone help me debug this please

Computers and Technology
1 answer:
Ludmilka [50]2 years ago
4 0
Based on what I’m seeing, It seems like in the string of line 11 you’ve put “What is your first item?” When it should be “What is you second item”.

Word of advice: It’s would be best if you write your consent variables in camel case. It’s helps with debugging and over all helps a reader easily understand what your coding.
You might be interested in
8.7 Code Practice Question 3
lorasvet [3.4K]

I included my code in the picture below.

8 0
2 years ago
Read 2 more answers
A hacker corrupted the name:IP records held on the HOSTS file on a client, to divert traffic for a legitimate domain to a malici
balu736 [363]

The type of attack that the hacker performed is Domain Name System (DNS) server cache poisoning.

<h3>What is DNS poisoning?</h3>

In Domain Name System (DNS) server cache poisoning, the hackers often enter into a DNS server because they want to make an adjustment to its directory so that it can point the domain name users enter to a wrong, IP address.

Note that Domain Name Server (DNS) poisoning is a form of system attack in which there is the change of DNS records which are then used to redirect online traffic to a wrong website.

Learn more about hacker  from

brainly.com/question/24956493

7 0
2 years ago
Apart from confidential information, what other information does NDA help to outline ?
Vikki [24]

There isn't enough info for me to answer this with complete confidence XD.

6 0
3 years ago
What layer is responsible for routing messages through an internetwork in the tcp/ip model?
Paul [167]

Answer:

<h2>The TCP/IP model consists of four layers: application, transport, internet, and network access. Of these four layers, it is the internet layer that is responsible for routing messages.</h2>
4 0
2 years ago
The process of creating a set of instructions that tell a computer how to perform a task is called:
zlopas [31]
It is known as a command
8 0
3 years ago
Other questions:
  • Select a classification for File2 so that: Alice can read and write to File2 Bob and Charlie can write to File2, but can't read
    6·1 answer
  • Jack is writing a paragraph for a school assignment. He proofreads his paper and notices that he used the word, "then" many time
    15·2 answers
  • ____ devices are high-performance storage systems that are connected individually to a network to provide storage for the comput
    5·1 answer
  • Seth is researching new developments in cancer treatments. Which suggestion would be most beneficial to making sure his search r
    14·1 answer
  • In creating a professional action plan it's important to
    12·1 answer
  • Email Communication has it own set of etiquette guidelines for users to follow if they want to be effective communicators. Which
    7·1 answer
  • Colin Mackay Inc., a software company with its head office in Amsterdam, has employees across three continents. Certain project
    11·1 answer
  • Emma lives in Pennsylvania, what climate does she live in?
    7·1 answer
  • Do small companies need computers? why?<br>​
    12·1 answer
  • You have a filtered dataset for Customer Sales with some null value rows. You want to remove these rows completely. How will you
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!