1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DiKsa [7]
3 years ago
8

Who can help me with 50 varables on codeskulptor​

Computers and Technology
1 answer:
MrMuchimi3 years ago
6 0

Answer:variables - placeholders for important values

# used to avoid recomputing values and to

# give values names that help reader understand code

# valid variable names - consists of letters, numbers, underscore (_)

# starts with letter or underscore

# case sensitive (capitalization matters)

# legal names - ninja, Ninja, n_i_n_j_a

# illegal names - 1337, 1337 ninja

# Python convention - multiple words joined by _

# legal names - elite_ninja, leet_ninja, ninja_1337

# illegal name 1337_ninja

# assign to variable name using single equal sign =

# (remember that double equals == is used to test equality)

# examples  

my_name = "Joe Warren"

print my_name

my_age = 51

print my_age

# birthday - add one

#my_age += 1

print my_age

# the story of the magic pill

magic_pill = 30

print my_age - magic_pill

my_grand_dad = 74

print my_grand_dad - 2 * magic_pill

Explanation:placeholders for important values. 2. # used to avoid recomputing values and to. 3. # give values names that help reader understand code. 4. ​. 5. ​.

You might be interested in
This is Microsoft Word. ONLY RIGHT ANSWERS. 50 points
pishuonlain [190]
She should select the first sentence then press and hold ALT while selecting the second sentence
5 0
3 years ago
Which types of charts are examples found in Excel? Check all that apply.
marysya [2.9K]

Answer: 1,2,4,5,6

Explanation:

columns

bar

histogram

pie

scatterplot

5 0
3 years ago
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or tra
Sergeu [11.5K]

Answer: Information security

Explanation:

 The information security is one of the system that keeps the data confidential, assure the integrity and also availability of the information or data.

This system is basically refers as the CIA triad in the information security system and the data risk management.

The main aim of the information security is that keeps the data protected from the unauthorized accessing and also  controlling the access in the system.

Therefore, Information security is the correct answer.

8 0
3 years ago
10.A chlorine ion (Cl-) would most likely bond with _____.<br><br> A.Cl-<br> B.Mg<br> C.K+<br> D.O
andrezito [222]
B. Mg
Hope this helps ☺
6 0
3 years ago
Which of the following options would enable you to block inheritance for a folder, retain all of the same permissions as the par
AfilCa [17]

Answer:

c

Explanation:

you have to open the file explorer and disable the inheritance permission on file folder, you will also have to access the security tab access advanced key and disable inheritance

6 0
3 years ago
Other questions:
  • I'll give brainlist to right answers
    7·1 answer
  • Which are types of lines? Choose three answers.
    9·1 answer
  • Instructions:Select the correct answer.
    5·1 answer
  • What is the purpose of the operating systems management function
    5·1 answer
  • Best app in free to learn python
    7·1 answer
  • Which option best explains the goal of computer science?
    9·1 answer
  • Vices for a research paper
    6·1 answer
  • Giving 5 stars, a Thanks, 80 points, and Branliest to whoever answers them correctly.
    9·1 answer
  • Different between input and output device​
    5·1 answer
  • It converts Assembly Language into machine language?​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!