1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OLga [1]
3 years ago
10

Python: Bad input on line 8. What is the fix, please can someone tell me I’m desperate?

Computers and Technology
1 answer:
JulijaS [17]3 years ago
8 0

Answer: use GitHub or stack over flow or

repl. it

Explanation:

You might be interested in
Miriam is very detail oriented within the first month of her new job as a network support specialist she became very good at dia
love history [14]
What is the question?
3 0
3 years ago
Write a Java expression that converts the value of 'y' into an integer, and assigns the value to 'x'.
Kamila [148]

\huge{\purple{\underline{\underline{\mathfrak{\red{\bigstar answer:: \bigstar}}}}}}

int y = (int) y;

int x = y;

<h2><u>Hope</u><u> </u><u>it</u><u> </u><u>helps</u><u>.</u><u>.</u><u>♪</u></h2>
7 0
2 years ago
Ronald attended a seminar about the best practices to use when browsing the Internet. The presenter used the following statement
Salsk061 [2.6K]

Answer:

Ronald missed the words: One-time password, Secure  

Explanation:

Whenever we use public computer, there are possibilities to steal the user data by hackers. It might not be safe to use as like we have protection in personal or Office computers. But when a situation arises to use a public system, it is always recommended to use one-time password so that the logins are not misused thereafter.

Even if the hackers try to misuse, the user will get a message / authentication reply to use the login and thus we are safe. Also, always browse only secured website ie. “https”.

8 0
3 years ago
Read 2 more answers
Who is Carl Thompson?
pishuonlain [190]
Carl Thompson was a well know Jazz player back in the mid 1900s
7 0
2 years ago
Static packet filtering firewalls are limited to ________. inspecting packets for which there are good application proxy filteri
inna [77]

Answer:

The answer to the following question is "inspecting packets in isolation from their context".

Explanation:

Static Packet Filtering a technique for implementing security of the firewalls. In this process, it checks each packet against a group of commands if commands allow the type of packet then it is passed otherwise, it is dropped. It controls access to a network by analyzing the sending and receiving packets based on the IP addresses of the source and destination.

7 0
3 years ago
Other questions:
  • Cleaning the keyboard is the most important part of keeping your computer running at peak performance.
    5·2 answers
  • Selecting the option to control Widows and Orphans will prevent _________. A single line from appearing at the top or bottom of
    10·1 answer
  • A ____ operating system should be capable of supporting the applications and tools necessary to support Internet operations.
    10·1 answer
  • what aspect should you consider before adding pictures to a document? you should structure the first before you search for a rel
    15·2 answers
  • Many computer magazines and Web sites present comparisons of several DBMSs. Find one such DBMS comparison article and compare th
    10·1 answer
  • How many transponders are contained within a typical satellite?
    12·1 answer
  • Is the app scener safe? its a chrome webstore app on computer.​
    13·1 answer
  • Who is the best nfl team in your mind
    14·2 answers
  • Which storage device is not recommended as a permanent storage solution?
    6·1 answer
  • sing the drop-down menu, identify the flowchart symbols. The oval represents the . The rectangle represents the . The diamond re
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!