1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tasya [4]
3 years ago
12

Edhesive coding practice 3.4​

Computers and Technology
1 answer:
malfutka [58]3 years ago
7 0

Answer:

green= input("Enter the Green")

if(green == "green"):

   print("You have entered correct option")

else:

   print("You have entered wrong option")

Explanation:

We need to explain the if else ladder through the Python program. And the program for it can be found in the answer section.

You might be interested in
When transporting data from real-time applications, such as streaming audio and video, which field in the ipv6 header can be use
tester [92]

The answer is flow label. This has the role of sending source to a unicast or multicast to meet its destination and that in order to function, it is in need of intervening routers in which it provides special handling.

4 0
3 years ago
Disuss the roles of hardware,software and databases in regard to computer based information systems
forsale [732]

Explanation:

Data bases; interpretation and presentation of data in useful formats by transforming raw data into information, data storage management.

Hardware: helps to get to the physical and tangible part of computer.

Software; helps to access the word processor, spreadsheet's and social media platforms and general operations in a computer.

6 0
2 years ago
Which of the following is not a method for opening Word software?
timofeeve [1]

Answer:

right clicking on the desktop and selecting "view"

Explanation:

Some of the methods for opening Microsoft Word software include;

using the Ms. Word icon on the task-bar

searching for the Ms. Word program if you are using the Widows operating system

using the Ms. Word icon on the desktop

On the other hand, right clicking on the desktop and selecting "view" is a procedure for changing icon settings on desktop,

8 0
3 years ago
Read 2 more answers
!!!!!16 POINTS!!!!Can a computer evaluate an expression to something between true and false? Can you write an expression to deal
levacccp [35]

Answer:

Yes a computer can evaluate between a true or false. x < 1, and if the condition is met, the value is true, else its false. A computer itself cannot handle any "maybe" expression, but with the influence of human opinion, in theory its possible. Chocolate cake < Vanilla cake, is an example. Entirely on opinion.

4 0
3 years ago
How many digits are in the binary number system? Explain why.
Katen [24]

Answer:

Since there are only two digits in binary, there are only two possible outcomes of each partial multiplication: If the digit in B is 0, the partial product is also 0. If the digit in B is 1, the partial product is equal to A.

Explanation:

8 0
2 years ago
Read 2 more answers
Other questions:
  • How can you find Web pages that contain news published during the past week?
    8·1 answer
  • 2. Now write a program named filereader.py that reads and displays the data in friends.txt. This program should also determine a
    5·1 answer
  • After placing her insertion point after Grandma’s Kitchen, order the steps Danica needs to follow to insert and format the regis
    8·2 answers
  • What category of sensory receptors are sensitive to touch sound and motion?
    10·1 answer
  • Which Numpy function do you use to create an array? (Points : 1) np
    5·1 answer
  • The chief intellectual property officer (CIPO) is responsible for collecting, maintaining, and distributing the organization's k
    14·1 answer
  • Select the correct answer from each drop-down menu.
    6·1 answer
  • Which game would you play info you were competitive?
    13·2 answers
  • The files in James's computer were found spreading within the device without any human action. As an engineer, you were requeste
    11·1 answer
  • Greg is concerned about the use of ddos attack tools against his organization, so he purchased a mitigation service from his isp
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!