1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvv77 [185]
3 years ago
10

Which code will allow Joe to print Coding is fun. on the screen? print("Coding is fun.") print(Coding is fun.) print = (Coding i

s fun.) print = Coding is fun.
Computers and Technology
2 answers:
ludmilkaskok [199]3 years ago
7 0

Answer:

print(“Coding is fun.”)

Explanation:

The proper format for a print statement is usually you have the print statement followed by the string in quotes in parentheses.

Hope this helped!

ozzi3 years ago
3 0

Answer:

print(“Coding is fun.”)

Explanation:

You might be interested in
Write a program which will -
Hitman42 [59]

Answer:

down below

Explanation:

score = input() # gets student's score input

max = input() # gets max number

percent = (score/max)*100 # multiply by a hundred to get percentage

if percent > 52: # checks if percent is greater than 52

  print("well dont you have at least a grade 5")

else # if percent is less than or equal to 52 it will print this instead

  print("Unlucky, you need to revise more for the next test.")

THIS PART IS NOT CODE:

make sure you indent/tab the print statements or else you'll get an error

6 0
2 years ago
All of the following are eras in IT infrastructure evolution except the​ ________. A. general purpose mainframe and​ mini-comput
Digiron [165]

Answer:

C: disruptive technology era

Explanation:

There are five main stages in IT infrastructure era and the are, in order from the oldest to the newest; the mainframe and minicomputer era, the personal computer era, the client/server era, the enterprise era, and the cloud computing being the newest in the five stages eras of IT infrastructure.

7 0
3 years ago
I was not supposed to upgrade my iPad to iOS 11 due to testing but it automatically did when I was charging it. Is there a way t
VashaNatasha [74]
Yes there is a way, you can just go to the backup/system operating system and delete/archive the update, but its only a limited amount of time though, and to be honest with most software, its very hard to downgrade an update, that requires professional skills, but there is a way. If you want try looking up how to downgrade an update for ios on google search and that should help you.
6 0
3 years ago
What are the contents of memory locations 200, 201, 202, and 203 if the word 1234 is stored at offset 200 and the word 5678 is s
Igoryamba

Answer:

Data at the following addresses will be as following:-

200 :- 34

201 :- 12

202 :- 78

203 :- 56

Explanation:

If there is 1 byte storage.

if the data is of 4 digits.Then we have to store it in 2 memory locations.

The first two digits will be stored at the higher byte address that is 201 and the last two digits will be stored at then lower byte address that is 200.

The case is same with the next data 5678.

At address 202 :- 78 will be stored and at address 203 :- 56 will be stored.

3 0
3 years ago
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
2 years ago
Other questions:
  • This information is generally included on a fax cover sheet.
    15·1 answer
  • You can install several printers on your machine, but at least one must be the _______ printer.
    6·1 answer
  • Software that function as an electronic file cabinet
    7·1 answer
  • Write a class "Dog" with a private int field called months and two public member functions setAge and GetStage. setAge takes as
    13·1 answer
  • When referring to hard drives, access time is measured in
    11·1 answer
  • To exclude members of a group from the basic permissions for a folder, which type of permission would you assign? Deny Allow Mod
    13·1 answer
  • Select the correct answer.
    12·2 answers
  • Top 5 best comedy or action movies.
    9·2 answers
  • When you pass a double variable to a method, the method receives ______.a) a copy of the memory addressb) the reference of the v
    12·1 answer
  • Website designers work on the code and programming of a website, not the style or layout of the site.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!