1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilya [14]
3 years ago
9

Edhisive 3.5 code practice

Computers and Technology
1 answer:
Amanda [17]3 years ago
7 0

Answer:

x = int(input("What grade are you in? "))

if (x == 9):

   print ("Freshman")

elif (x == 10):

   print("Sophomore")

elif (x == 11):

   print ("Junior")

elif (x == 12):

   print("Senior")

else:

   print ("Not in High School")

Explanation:

You might be interested in
Which option describes a balanced slide?
Umnica [9.8K]

Answer: a slide with a size 18 font and five images

Explanation:

the text isnt that big to overpower the images and vise versa

4 0
3 years ago
Did batman die in endgame? I dont have enough money to see the movie can you tell me what happens. It said batman died from some
kotykmax [81]

Answer: The Marvel batman, otherwise known as Iron Man did.

Explanation: Movie was pretty good.

5 0
3 years ago
an attack has changed the value of a variable used when copying files from one cloud server to a local drive. what is the most l
BaLLatris [955]

Based in the provided information, The attacker utilized integer overflow attack which could bring alteration to the state of the local drive's memory.

<h3>What is an attack in computer terms?</h3>

An attack can be regarded as violation of one's data or information on the computer system.

Since, the attacker, changed the value of a variable used when copying files from one cloud server to a local drive, his motive was alteration to the state of the local drive's memory.

Learn more about attack on drive at;

brainly.com/question/11352260

5 0
3 years ago
Privacy settings allow account owners to decide who can ........
schepotkina [342]
Have access to your phone info
4 0
3 years ago
Read 2 more answers
If a user has one column in a table and would like to make it into two columns, which command should be used?
8090 [49]

Answer:

Split Cells

Explanation:

7 0
3 years ago
Other questions:
  • ?the single most effective security measure for digital devices is to password protect access to them.
    5·1 answer
  • What sequence is used to create a brochure document from a template?
    8·2 answers
  • You want to place a video from the internet to your desktop. what process do you use?
    15·1 answer
  • Create a file with a 20 lines of text and name it "lines.txt". Write a program to read this a file "lines.txt" and write the tex
    12·1 answer
  • How to see if your computer has bluetooth?
    6·1 answer
  • Aapke question about computer keyboard​
    5·1 answer
  • A date consists of a month, day, and year. Consider the class Date of such dates. Suppose that Date represents the month, day, a
    14·1 answer
  • Consider a Rational class designed to represent rational numbers as a pair of int's, along with methods reduce (to reduce the ra
    15·1 answer
  • Which memory can be removed from motherboard? RAM OR ROM?​
    7·1 answer
  • 3. It is important to make certain that your employees are aware of the work ethic
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!