1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anyanavicka [17]
2 years ago
9

Read two numbers from user input. Then, print the sum of those numbers. Hint - Copy/paste the following code, then just type cod

e where the questions marks are to finish the code. numl - int (input()) num2 = ? print(numl + ?) Note: Our system automatically runs your program several times, trying different input values each time to ensure your program works for any values. Notes on how to solve this. See How to Use zyBooks for info on how our automated program grader works istof Helpl....docx Essay 1 (1).docx Team Cut
Computers and Technology
1 answer:
Dmitriy789 [7]2 years ago
8 0

Answer:

The full program is:

<em>num1 = int(input()) </em>

<em>num2 = int(input()) </em>

<em>print(num1 + num2)</em>

<em />

Explanation:

Given

<em>num1 = int(input()) </em>

<em>num2 = ?</em>

<em>print(num1 + ?)</em>

<em />

Required

Replace ? with the right codes

Line 1: The syntax is correct

Line 2: The ? should be replaced with an integer input function to get input for num2.

So, the second line would be: <em>num2 = int(input()) </em>

Line 3: The ? should be replaced with num2 in order to calculate and print the required sum.

So, the third line would be: <em>print(num1 + num2)</em>

<em />

You might be interested in
You are tasked with securing a small network for a client in which the following requirements must be met: If a user on the priv
mario62 [17]

Answer:

C

Explanation:

It is best to Implement a UTM appliance.

A Unified Threat Management (UTM) system is a type of network hardware appliance, virtual appliance or cloud service that protects businesses from security threats in a simplified way by combining and integrating multiple security services and features.

DescriptionUnified threat management is an approach to information security where a single hardware or software installation provides multiple security functions. This contrasts with the traditional method of having point solutions for each security function.

Cheers

8 0
3 years ago
can someone tell me what to do i’m kinda stuck and don’t know what he’s telling me to do pls ill give brainlist and points
Alexandra [31]

Answer:

Well a debtor is basically someone owing someone money, basically someone in debt. He’s telling cup head boy to take care of the people who owe him or someone else their or his money. Thats basically it.

8 0
2 years ago
Why does the position of drawCircle(x, y, r) in the answer choices matter?
Andrei [34K]

Answer:

B and C

Explanation:

xPos and yPos determine the center of the circle, and rad determines the radius of the circle drawn.

It cannot be A because it starts drawing a circle with the center of (4, 1). None of the circles ahve a center at (4, 1). It is B because while it does start at (4, 1), the repeat function adds one to the y and radius. While ti repeats 3 times it ends up drawing all 3 circles. C also works because it starts by drawing the biggest circle and then subtracting the values to make the other two. It cannot be D because in the repeat function it subtracts from the y value and radius too early, it doesn't draw the biggest circle.

6 0
1 year ago
I don't understand how to write both. If I repeat the first code but with 3 and 6 it doesn't work.
hram777 [196]

It looks like you need to get both numbers from the input. Try doing something like this:

print(int(input()) + int(input()))

4 0
2 years ago
Which is an example of an binary number?
Liula [17]
The second one
01111
This is because a computer uses binary and only understands two digits which consit of 1 and 0
8 0
3 years ago
Read 2 more answers
Other questions:
  • In fiberoptic cable, the signal source is__________waves
    7·1 answer
  • Select all of the uses of presentation software in the workplace.
    8·1 answer
  • A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student disco
    9·1 answer
  • Unix is called a(n) ___________ operating system because it can run on a desktop pc or a server. operating systems installed on
    7·1 answer
  • Create a new file that builds a shopping list from a user. There should be a input query that asks the user to list an item and
    11·1 answer
  • If two hosts are connected by five networks, how many frames will there be when one host sends a packet to the other host? 1 2 5
    13·1 answer
  • When did outdoor air pollution first become a significant problem?
    9·1 answer
  • One key to success in a career is to be an accomplished
    15·1 answer
  • "Rights and duties are two sides of the same coin." Explain with examples​
    5·1 answer
  • Which terms represent the two types of client requirements?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!