1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sphinxa [80]
3 years ago
7

[20 points] 3.3 Code Practice: Question 2

Computers and Technology
1 answer:
igor_vitrenko [27]3 years ago
3 0

Answer:

See explanation

Explanation:

The attachment show that you've attempted the question already.

I'll assist in making corrections to your source code.

First, edit line 5 to

if(r<= 255 and g<=255 and b <=255):

Then edit line 8 to:

if(r>= 255):

Then edit line 11 to:

if(g>= 255):

Lastly, edit line 14 to:

if(b>= 255):

<em>Other part of the attachment is correct</em>

You might be interested in
A(n) _______ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packet
malfutka [58]

Answer:

DoS or Denial of Service

Explanation:

Have a nice day! :)

3 0
2 years ago
What is star topology
Alexxx [7]
Every node connects to a central network device. like a hub, switch, or computer.
4 0
2 years ago
Read 2 more answers
United Broke Artists (UBA) is a broker for not-so-famous artists. UBA maintains a small database to track painters, paintings, a
lions [1.4K]

Answer:

Check the explanation

Explanation:

Kindly check the attached image below to see the relation and the table names.

7 0
3 years ago
Read 2 more answers
What is profession explain with example​
WARRIOR [948]

Answer:   a profession is a job, or what you do for a living

example : a teacher is an example of proffesion

4 0
3 years ago
Read 2 more answers
Help me. its due tonight
Novosadov [1.4K]
d- enjoy
b- national service !
5 0
2 years ago
Other questions:
  • You should use _____ software for writing a letter.
    10·1 answer
  • PLEASE HELP 15 POINTS Emma plans on building a dog house using an algorithm. What will be the final step of the process? a) crea
    6·1 answer
  • Of which of the following devices are point, drag, and click actions?
    15·1 answer
  • 2(x-5)-3(3-x)=1/2(x-2)
    9·1 answer
  • The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling int
    9·1 answer
  • What are the advantages to using a linked implementation as opposed to an array implementation?
    8·1 answer
  • Which of the following substances increases in quantity during repititive muscle contraction during oxygen deficti ?
    11·1 answer
  • What can macro mode on a camera be used for?
    12·2 answers
  • In a computer-controlled greenhouse, a temperature sensor and a window motor are connected to the computer.
    10·1 answer
  • Identify and state the value of hardware components​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!