1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FinnZ [79.3K]
3 years ago
6

Write a program that asks the user to provide a word, validate that it is a word, and print the word.

Computers and Technology
1 answer:
natta225 [31]3 years ago
8 0

Answer:

be clearer. your question doesn't seem to be presented well

You might be interested in
Identifying the problem is crucial when trying to solve a problem. There are several techniques that you can use to aide you in
erica [24]
Consensus Building is NOT a technique that you can use to help you in identifying a problem.
8 0
3 years ago
What is the full meaning of ICT
leva [86]
Information commination technology :)
6 0
4 years ago
Read 2 more answers
What type of address uses a number that uniquely identifies each computer?
Anna [14]

Answer:

The awnser is D or IP Address

Explanation:

<h2>BRAINLIEST PLEASE</h2>
8 0
3 years ago
Read 2 more answers
While checking your work e-mail, you have received an e-mail warning you about a virus that is currently doing the rounds. What
choli [55]

Answer: D) Do an extensive web search to learn if it is a real virus.

Logical explanation: In the example, it is not a pop-up that you have a virus and instead an email that you have a virus. There is a very likely way that it could be a prank, scam, or a hacker.

Elimination explanation: If we look at all the answers:

A (Forward it to everyone in your address book) makes no sense, so A is eliminated.

Then with B (Forward it to your tech administrator) makes sense because if it was a real virus they may know what to do, but as my 'Logical explanation' explains, it may not be.

Finally with C, it's very irresponsible and should not be done. If it was a real virus there is a possibility it could be someone trying to steal information and more.

This leaves only option D left. :)

<h2><u>If this helped at all (or not), please remember to rate, thank, and mark brainliest as seen fit. Have a great day and stay safe! :)</u></h2>
4 0
3 years ago
Which of the following is not a type of bank?
andreyandreev [35.5K]
Where is the following banks that is listed?
3 0
3 years ago
Read 2 more answers
Other questions:
  • 1. When you write HTML code, you use ______ to describe the structure of information on a webpage. a. a web address b. tags c. s
    6·1 answer
  • The date June 10, 1960, is special because when it is written in the following format, the month times the day equals the year:
    6·1 answer
  • Which attitudes are most common among successful IT professionals?
    7·1 answer
  • The term _______ is used to refer to programs that attackers install after gaining unauthorized access to a system, ensuring tha
    15·1 answer
  • after clicking the start button on your computer screen desktop what option would you then select to examine systems components
    6·1 answer
  • Which of the following is the best name for a history report about World War I?
    7·2 answers
  • Number of megabytes of RAM in a computer. qualitative or quantitative? because
    14·1 answer
  • Functions can accept any number of arguments.
    8·1 answer
  • Question #5
    15·2 answers
  • What is the purpose of secondary<br> memory?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!