1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Step2247 [10]
3 years ago
14

opy the code below into the coderunner window. Debug the code so that it outputs the verses correctly. a = input("Enter an anima

l: ") s = input ("Enter a sound: ") e = "E" print ("Old Macdonald had a farm, " + e) print ("And on his farm he had a" + a + "," + e) print ("With a " + a + "-" + a + " here and a" + s + "-" + s + " there") print ("Here a "+ s+ " there a " +s) print ("Everywhere a" + s + "-" + a ) print ("Old Macdonald had a farm," + e)\
Computers and Technology
1 answer:
Inessa05 [86]3 years ago
6 0

This code runs correct if you put every statement on a new line. You will want to replace e = "E" with e = "E-I-E-I-O" and add some spaces in the strings here and there so that the text is properly formatted. That'll be obvious after you run it for the first time.

You might be interested in
List the names of 3 computer scientists
ikadub [295]

Hi there! Hopefully this helps!

------------------------------------------------------------------------------------------------------

1. Barbara Liskov.

2. Carl Sassenrath.

3. Larry Page.

4 0
3 years ago
Read 2 more answers
How do i work on code with someone else? i use visual studio code. me and a friend wanna make a game together with code. how do
Art [367]

Answer:

You can use Repl.it.com......It's best for practising coding languages...

7 0
3 years ago
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
A Network Attached Storage device is good for _____.
igomit [66]

Answer:

sharing data across multiple workstations on the same network

Explanation:

A Network Attached Storage device is good for sharing data across multiple workstations on the same network.

3 0
3 years ago
Read 2 more answers
g You need to build a circuit to perform parallel data transfers from one set of registers to another. The interconnections betw
Phoenix [80]

Answer:

JK Flip Flop

Explanation:

Flip Flops is a fundamental building blocks of digital electronics systems.  It  is an electronic circuit with two stable states that can be used to store binary data.  However, a JK Flip Flop is a type of universal flip-flop that makes the circuit toggle between two states and is widely used in shift registers.

So when building a circuit to perform parallel data transfers from one set of registers to another, a JK Flip Flop is the best choice he register FFs when you need to hold the interconnection between the register to a minimum.

6 0
4 years ago
Read 2 more answers
Other questions:
  • A company that hires only American Indians is practicing
    5·2 answers
  • The length, height, and width of a cube are 10, 7, and 5 cm respectively. Write a program that calculates the volume, perimeter,
    9·1 answer
  • What is one strengths of line graph? a) Line graphs show percentage in a whole b) Line graphs show change over time c) Line grap
    13·2 answers
  • Create a script that asks for the visitor's weight in pounds and his/her height in inches. The program should then calculate the
    13·1 answer
  • Which ofthe following is the most correct statement about the interestsection of the indirect plan for persuasion?
    8·1 answer
  • Key
    6·1 answer
  • Develop an algorithm to print the names of the candidates who should receive a refund. A refund is due if the candidate's votes
    7·1 answer
  • Who is known as Mecile Man of India?​
    7·2 answers
  • Business Rules constraints falls into two categories:
    7·1 answer
  • Information technology student Roberta has been assigned a project on how to detect unwanted outgoing attacks. Which step is par
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!