1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Afina-wow [57]
4 years ago
11

Hi! This is python coding. Please don't take advantage, actually, answer!

Computers and Technology
1 answer:
Greeley [361]4 years ago
8 0

Answer:

Try and do number = 7

If that does not work then I dont know what to tell you.

Explanation:

You might be interested in
How many Brainliest in total can you give? Is there a limit to how many Brainliest you can give per day or per person?
Arturiano [62]

Answer:

Don't think so.

Explanation:

Oh! Can you please give me Branliest? I need it for an acheivement. It would help a lot if you did!

3 0
3 years ago
Read 2 more answers
Which of the following are actions a programmer could take when debugging a segment of code that would most likely lead to findi
Verizon [17]

Answer:

Option B and C are the correct answer for the above question

Explanation:

The above question asked about the work of the programmer to catch an error of the program--

  • Then the option B states that the programmer needs to prints the value of the various program variable on every line of the program which is the correct solution because it is used to find the error easily. It defines the value of every variable in every place of the program and the programmer caught the error statement in the program if anywhere the variable gets the false value.
  • The C option states to help from a friend, it is also a good solution because the friend can easily be caught the error of the program by seeing every line of code.
  • But the other option is not correct because the option A states that the change the name of the variable which is not a result of anything.
  • And the option D states that the code will be retyped again which is also not justify anything.

6 0
3 years ago
What was the first registered domain name?
emmasim [6.3K]
The first domain name registered was Symbolics.com<span>. It was registered March 15, 1985, to Symbolics Inc., a computer systems company in Cambridge, Mass</span>
6 0
4 years ago
Can a non-void method use the keyword return without returning a value? Explain your answer.
max2010maxim [7]

Answer:

False. A non void method must return something.

Explanation:

No, a non-void method has return statement in it and it returns a value based on the return type in the method declaration and the implementation of that method. Every non - void method has to return a value depending on its declaration. A non void method should have a return statement in it. As it is a non - void method and has return statement in it, it returns a value based on the implementation of that method. If a void method contains return statement in it, the method exits.

6 0
3 years ago
Chris wants to view a travel blog her friend just created. Which tool will she use?
wolverine [178]

Answer:

Web browser

Explanation:

7 0
3 years ago
Other questions:
  • A switch operates in the OSI reference model __________ layer and uses the __________ address to forward packets.
    8·1 answer
  • What is the last step when creating a maintenance schedule? develop a reminder system read the manuals log the maintenance compl
    6·1 answer
  • Page _____ refers to whether a page is laid out vertically or horizontally.
    12·1 answer
  • __________ has the highest conviction rate of any vehicle-related offense.
    11·1 answer
  • QUESTION 1
    7·1 answer
  • DigitalHealth Electronics Inc. is a company that builds diagnostic devices. It was the first company to develop a compact MRI sc
    13·1 answer
  • I NEED answers for these qu plz
    5·1 answer
  • Q13. On which option do you click to
    12·1 answer
  • Which formatting options can be changed by selecting the Design tab? Check all that apply.
    7·2 answers
  • Which security protocol for wireless networks attempts to establish the same security for them as would be present in a wired ne
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!