1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
____ [38]
3 years ago
7

Write a program that asks the p34won to enter their grade, and then prints GRADE is a fun grade. Your program should repeat thes

e steps until the user inputs I graduated
Computers and Technology
1 answer:
andrew-mc [135]3 years ago
8 0

Answer:

Following are the code to this question:

def fun():#defining a method fun

  while True:#defining a while loop  

      g = input("Enter your grade: (I graduated) ")#defining variable g for input value

      if g == "I graduated":#defining if block to check string value

          return 0#return  

      print("{} is a fun grade".format(g))#use print method to print string value  

fun()#calling the method

Output:

Enter your grade: (I graduated) 1st

1st is a fun grade

Enter your grade: (I graduated) 2nd

2nd is a fun grade

Enter your grade: (I graduated) I graduated

Explanation:

In the given python code, a method "fun" is defined, and inside the method, a while loop is defined, which uses a variable "g" for input value from the user-end.

In the next step, if block is defined to check string a value and return a value 0, and use the print method to print the given value, and call the above method fun.  

You might be interested in
Write a program to output the following quote by Edsger W. Dijkstra:
adell [148]

Answer:

#include<iostream>

using namespace std;

main(){

cout<<"\*Computer Science is no more about computers \n than astronomy is about telescopes"<<endl;

}

Explanation:

using c++

5 0
2 years ago
Read 2 more answers
Scenario: 1. Victim opens the attacker's web site. 2. Attacker sets up a web site which contains interesting and attractive cont
Ann [662]

Answer :

These sort of attacks are known are Injected IFrame Attacks. The Injected IFrame Attacks are a common Cross Site Scripting or XCC attack that contains multiple or single iFrame tags implemented within a page which is not visible to user. User unintentionally enters his information which is posted to hacker’s server and information’s gets hacked.

5 0
3 years ago
Which of the following, when used in conjunction with hyperlinks, can be useful for easily navigating a Word document? : *
Valentin [98]
Caption is a best answer i hope its work
7 0
3 years ago
A colleague is complaining about the slowness of a desktop computer, and you explain that the slowness is
mr_godi [17]

Answer:

You are explaining a virtual server

I hope this is correct.

Explanation:

A virtual platform is a software based system that can fully mirror the functionality of the platform, it provides full visibility

A virtual server, on the other hand converts one physical server into multiple virtual machines that can each run their own operating system, it is hosted by a offsite dsta center

6 0
2 years ago
Is there actually a difference between left and right twix
olga2289 [7]
One has more caramel and one has more cookie
6 0
2 years ago
Other questions:
  • To keep a desktop computer or a server powered up when the electricity goes off in addition to protection against power fluctuat
    8·2 answers
  • Is the Internet dangerous?
    10·2 answers
  • ساعدوني على الإجابة على هذه الأسئلة
    11·1 answer
  • Why would a programmer use a flow chart? (Edge2020 Coding Critical Thinking Questions)
    9·1 answer
  • Write a structure declaration to hold the following data about a savings account: Account Number (string object) Account Balance
    8·1 answer
  • Consider the following code segments that are potential replacements for /* missing code */.
    6·1 answer
  • in a stop-and-wait arq system, the bandwidth of the line is 1 mbps, and 1 bit takes 10 ms to make a round trip. if the system da
    12·1 answer
  • What is Data rate?<br> What is BAUD RATE?<br> What is bandwidth?
    8·1 answer
  • What should you do when you are working on an unclassified system and receive an email.
    10·1 answer
  • What do you think that private information like passwords pin number will be guarded or shared with the public? why?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!