1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlexFokin [52]
3 years ago
8

8.2 code practice edhesive?

Computers and Technology
1 answer:
Illusion [34]3 years ago
6 0

Answer:

temperatures = []

i = 0

while i < 5:

   try:

       t = int(input('Enter a temperature: '))

       temperatures.append(t)

       i += 1

   except ValueError:

       print('Enter a number')

print(temperatures)

Explanation:

Hope this helps!

You might be interested in
Which is a copyright
Andrew [12]

Answer:

All of the above I think

3 0
3 years ago
Your mom is trying to save room on her hard drive and wants to uninstall some of her applications. She asks you how to do this.
katen-ka-za [31]
<span>Explore and select Uninstall from the context menu. B. Right-click on the application execution file and select Delete from the context menu. C. Go to Task Manager and find the listed application, then right-click on it and select Uninstall. D. Go to Programs and Features and find the listed application. Then right-click on it and select Uninstall.

Hope this helped!</span>
6 0
4 years ago
Read 2 more answers
Is a book considered technology?
kumpel [21]
Yes, "technology" doesn't have to be all about computers or cell phones.. Technology is anything that is a new advance in knowledge and books were once a great advance in that field.
7 0
4 years ago
Read 2 more answers
Which of the following sets of acronyms is concerned with encoding data for secure transmission?
guapka [62]

I'm pretty sure your answer is VPN. Hope this helps!

7 0
3 years ago
Globalization is based on <br>​
Blababa [14]

Answer:

the growing interdependence of the world's economies.

Explanation:

it's of all the cultures and populations that crossed the border by trading

5 0
3 years ago
Other questions:
  • Exposing employee and customer personal data to an untrusted environment is an example of:
    9·1 answer
  • Which markup language would be considered the most current for web design? HTLM, HTML5, XHTLM, XHTML 6
    14·2 answers
  • The Internet may best be compared to a/an
    8·1 answer
  • In UNIX, how do I set the permissions on MyProgram.py to: rwx---r-x?
    7·1 answer
  • If you filmed a clip in 120fps, how many frames are in a seconds of video.
    13·1 answer
  • 4. Together, what do the divisions of the DHSMV do? A. Make sure lines are long B. Use more money than other government organiza
    14·1 answer
  • To display data in a certain manner, like alphabetical order, is called
    5·2 answers
  • Why was the IPv6 address format created? Select one:
    12·1 answer
  • If you are worried that team members will not keep sensitive information private, you could ask them to sign a ________ agreemen
    15·1 answer
  • Answer any one: write a computer program:which you know.​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!