1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vredina [299]
3 years ago
6

create a function that draws a certain number of spaces, followed by a certain number of stars, followed by a newline.

Computers and Technology
1 answer:
Mandarinka [93]3 years ago
6 0

Answer:

Explanation:

The following code is written in Python and creates a function called create_sentence which takes in 2 parameters which are the number of spaces and the number of stars. Then it uses these values to create the sentence and return it.

def create_sentence(spaces, stars):

   sentence = ""

   for x in range(spaces):

       sentence += " "

   for x in range(stars):

       sentence += "★"

   sentence += "\n"

   return sentence

You might be interested in
Why can’t a computer use source code
Elina [12.6K]

Answer:

A computer can use a source code

Explanation:

The code that was copied

gets compiled by the terminal and

gets its traced erased

therefore there is no need to give

credit and code still used in proccess

Example:

You can get a source code from stackoverflow

github, you can use that code to build your website

giving no credit to the owners of that code

the code will get its traced erased by the compiler

5 0
3 years ago
Read 2 more answers
oe, a user, receives an email from a popular video streaming website. the email urges him to renew his membership. the message a
ale4655 [162]

Where Joe, a user, receives an email from a popular video-streaming website and the email urges him to renew his membership. If the message appears official, but Joe has never had a membership before, and if when Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL, note that the security threat that this describes is: "Phishing" (Option B)

<h3>What is Phishing?</h3>

Phishing is a sort of social engineering in which an attacker sends a fake communication in order to fool a person into disclosing sensitive data to the perpetrator or to install harmful software, such as ransomware, on the victim's infrastructure.

To avoid phishing attacks, make sure you:

  • understand what a phishing scheme looks like
  • Please do not click on that link.
  • Get anti-phishing add-ons for free.
  • Don't provide your information to an untrusted website.
  • Regularly change passwords.
  • Don't disregard those updates.
  • Set up firewalls.
  • Don't give in to those pop-ups.

Learn more about Phishing:
brainly.com/question/23021587
#SPJ1

Full Question:

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.

Which of the following security threats does this describe?

  • Trojan
  • Phishing
  • Man-in-the-middle
  • Zero-day attack
5 0
2 years ago
what occurs when two adjacent conductors make electrical contact and by-pass a portion of the circuit?
Naily [24]
Its  a short circuit.
5 0
3 years ago
Describe the following software process models using your own words .Your explanation should also provide an example of a softwa
avanturin [10]

Answer:

Agile Development is a software methodology which is iterative.

Explanation:

Agile Development is a software methodology which is iterative.it is more useful to develop complex systems where regular touch up meetings/calls happen with the business to showcase their progress and ensure that the application is going in right direction. Compared to Waterfall ,where all phases are in sequence it is more recommended to design and develop complex software projects.

Agile Development is useful for complex software projects where we regularly in touch with the client and take our design and development decisions based on client feedback

Waterfall methodology is useful for simple projects where all the requirements are clear at the beginning and no more changes in requirement are required

6 0
4 years ago
What is the meaning of HML​
trapecia [35]

Answer:

Explanation:

Hit my line

4 0
3 years ago
Read 2 more answers
Other questions:
  • _______ are special incentives or excitement-building programs that encourage consumers to purchase a particular product, often
    7·1 answer
  • 3.24 LAB: Seasons
    13·1 answer
  • Each array in Java has a public field named ________ that contains the number of elements in the array.
    13·1 answer
  • What is blogging
    15·2 answers
  • Guys! Please help me! Please help me do this activity, and the best answer will be awarded with a surprise prize!
    14·1 answer
  • 52. Which of the following numbering system is used by the computer to display numbers? A. Binary B. Octal C. Decimal D. Hexadec
    12·2 answers
  • Select the answer that best descibes what an opportunity cost is
    6·1 answer
  • Which type of network cable is commonly used to connect office computers to the local network
    13·1 answer
  • Software that uses signature-based detection contains a library of signatures of known _____?
    11·2 answers
  • Make a list of any four computer that were used in the history of computer.​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!