1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vredina [299]
3 years ago
6

create a function that draws a certain number of spaces, followed by a certain number of stars, followed by a newline.

Computers and Technology
1 answer:
Mandarinka [93]3 years ago
6 0

Answer:

Explanation:

The following code is written in Python and creates a function called create_sentence which takes in 2 parameters which are the number of spaces and the number of stars. Then it uses these values to create the sentence and return it.

def create_sentence(spaces, stars):

   sentence = ""

   for x in range(spaces):

       sentence += " "

   for x in range(stars):

       sentence += "★"

   sentence += "\n"

   return sentence

You might be interested in
Is there an ethically acceptable reason to study and use the various attack methods described in this chapter? Can you think of
avanturin [10]

Answer:

Please see below  

Explanation:

Yes, there indeed is ethical justification for hacking certain computer systems. Since computer scientists are required to keep the system secure from external threats, so they make use of it when testing the network for potential loopholes that could make it vulnerable. It is beneficial in that it can help manifest the weaknesses present in the system, which can then be corrected for.

6 0
3 years ago
What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge
Bumek [7]
Hmmm when they say that we have a debt of $10,000 but you don't but you don't know that so they ask you for the personal data for your bank so their can get in and get the money for you so you don't have to and that how they trick you
4 0
2 years ago
Methods can be ____ correctly by providing different parameter lists for methods with the same name.
Serjik [45]
To complete the sentence - Methods can be overload methods correctly by providing different parameter lists for methods with the same name. 

Thank you for posting your question here at brainly. I hope the answer will help you. Feel free to ask more questions.
7 0
3 years ago
What is the most important element of microblogging?
lukranit [14]
The most important element is that It must be short
6 0
3 years ago
Which of the following is true about speculative risks? a. The risk/return tradeoff is applicable to speculative risks. b. Specu
My name is Ann [436]

Answer:

A) The risk/return Tradeoff is applicable to speculative risks.

Explanation:

Speculative risk always has a positive payoff and also a negative payoff , so option (b) is incorrect.

Speculative risk is a source of great concern for risk managers, so option (c)is incorrect.

Speculative risk is a category of risk that can be taken on voluntarily and will either result in a profit or loss , so option d is wrong

Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if it occurs: loss. Pure risk includes such incidents as natural disasters, fire or untimely death. so option (e) also incorrect

7 0
3 years ago
Other questions:
  • How many bit strings of length 12 contain the substring 111000?
    9·1 answer
  • A virus is a self-replicating program that produces its own code by attaching copies of it into other executable codes.
    7·1 answer
  • Why should cloud computing not be a set of silos? Provide real or made up examples of why incompatible solutions will fail in IT
    5·1 answer
  • At each layer of the OSI model, data is appended to the original message and then sent on to the next lower layer. What is this
    10·1 answer
  • / Looks up author of selected books
    15·1 answer
  • Design a flowchart for an algorithm which adds prim numbers starting from 1 up to 50. Change
    9·1 answer
  • What happens when your project is rendered?
    5·1 answer
  • Kenny FRIEND ME. Ps that is my brother
    9·2 answers
  • A form of segmentation that is based on user usage rate, user status, purchase occasion, and benefits sought is _________.
    13·1 answer
  • What OC level is primarily used as a regional isp backbone, and occasionally by very large hospitals, universities, or other maj
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!