1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blababa [14]
3 years ago
13

Assignment 4: Evens and Odds How do I fix this?

Computers and Technology
1 answer:
skelet666 [1.2K]3 years ago
6 0

There's definitely something wrong with your for loop. Try this:

for x in range(n):

You might want to check if all your print statements are correct. You might be missing just a period and it will be counted wrong.

You might be interested in
What structures in which lighting heating and other systems are controlled by computers
Ilia_Sergeevich [38]

Museum !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

8 0
3 years ago
Good morning beautiful people,
Nataliya [291]

Answer:

The girl that fed the dying boy?/

Explanation:

4 0
3 years ago
Looking at the code below, what happens when this onHit function runs?
inysia [295]
B dxjdbxhxbxbcjxxnxhcbfnc
7 0
3 years ago
Read 2 more answers
Explain how creating a model provides a practical solution for some scientific research.
ivann1987 [24]
Creating a model provides a practical solution for some scientific research by showing systems that are very large,small,or complex.Models are simplified representations of real objects or systems.Models can make things easier to study by zooming in on a single piece of a large system or magnifying something that is too tiny to see with the naked eye.
6 0
4 years ago
Read 2 more answers
Which is an ipsec protocol that authenticates that packets received were sent from the source?
fiasKO [112]

Answer:Encapsulating Security Payload (ESP)

Explanation:Encapsulating Security Payload (ESP) is a member of the IPsec protocol suite. It provides origin authenticity through source authentication, data integrity through hash functions and confidentiality through encryption protection for IP packets.

6 0
3 years ago
Other questions:
  • Write three tasks students can preform in a digital classroom?
    9·2 answers
  • Powerpoint s _____ feature allows you to set the timing for a video clip
    12·1 answer
  • Write a Java class called getName that prompts a user for their name and then displays "Hello, [name here]!" The flow should loo
    14·1 answer
  • Write a program whose input is a string which contains a character and a phrase, and whose output indicates the number of times
    8·1 answer
  • Which of the following is the last step in creating a budget?
    13·1 answer
  • Do not use the scanner class or any other user input request. You application should be self-contained and run without user inpu
    5·1 answer
  • Why have companies gotten more creative with ways to reach us?​
    14·1 answer
  • Ismael is examining a report in Access. He needs to access a view that will be used to examine and change the structure of the r
    9·2 answers
  • How to trigger watchers on initialization in vue.js ?
    6·1 answer
  • Which of the following commands can be used to display socket information out to the terminal screen
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!