Answer:
import random
arr=[]
for i in range(100):
arr.append(i)
while True:
answer=random.choice(arr)
guess=int(input("enter your guess number between 0-100: "))
if answer is guess:
print("right guess\ncongratulations.....")
print("the answer was: "+str(answer))
break
elif guess < answer-20:
print("you guessed too low....\ntry again")
print("the answer was: "+str(answer))
elif guess > answer+20:
print("you guessed too high....\ntry again")
print("the answer was: "+str(answer))
else:
print("incorrect guess\ntry again")
print("the answer was: "+str(answer))
Explanation:
Answer:
HAPPY BIRTHDAY EVEN THO WE JUST MET
<span> 1 and 3/4 in grams is
</span>1.75grams
A successful oral presentation depends on your ability to communicate your ideas clearly and with relevant content.
<h3>What is an oral expression? </h3>
- Oral presentations, often known as public speaking or just presentations, involve one or more speakers discussing a particular topic with an audience.
- This seeks to provide information, amuse, educate, and/or make a point.
- When the author speaks in front of other students, coworkers, or other interested groups to convey the results of years of expertise and research while outlining essential elements to success, the book is referred to as an example of oral presentation.
- An oral presentation is one of the best venues for fusing verbal prowess with powerful nonverbal indicators to extend your communication.
- It enables people to speak in front of a live audience with assurance about their thoughts and opinions.
To learn more about Oral presentation, refer to:
brainly.com/question/27326303
#SPJ4
After a Hacker has selects her target, the thing she scan next on the target's network to see if any are open System Ports.
<h3>How do hackers scan ports?</h3>
In port scan, hackers often send a message to all the port, once at a time. The response they tend to receive from each port will help them to known if it's being used and reveals the various weaknesses.
Security techs often conduct port scanning for a lot of network inventory and to show any possible security vulnerabilities.
Learn more about Hacker from
brainly.com/question/23294592