1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stels [109]
3 years ago
10

Fix the code :)

Computers and Technology
1 answer:
STALIN [3.7K]3 years ago
6 0

def main():

   print("This progam will display a story for you")

   person = input("Please give me a celebrity name ")

   setting = input("Please give me your favorite place to go ")

   time = input("Please give me a time of year ")

   item = input("please give me the name of your favorite food ")

   print("Once there was a person by the name of " + person + " who was visting the " + setting + " ." + " decide that because of quarantine it was so boring and being that it was " + time + " it was time to go eat " + item + ".")

main()

You have to indent everything inside the main function and then call the main function. The code runs find after that.

You might be interested in
In the code snippet, what is the “win” part called in programming?
MAXImum [283]
I think the answer is B: parameter
8 0
3 years ago
What is a word processor in ms word​
marysya [2.9K]

A word processor is software or a device that allows users to create, edit, and print documents. It enables you to write text, store it electronically, display it on a screen, modify it by entering commands and characters from the keyboard, and print it. Of all computer applications, word processing is the most common.

6 0
3 years ago
Read 2 more answers
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
OLEGan [10]

Answer: Stealth scanning technique

Explanation:

Stealth Scanning technique includes the following steps:

1. The client upon sending a single SYN packet to is responded by SYN/ACK packet if the port is open.

2. The port is assumed to be in closed state if the RST packe t is sent from the server.

3. This RST packet is sent by the client to close the initiation process so that a connection cannot be established.

6 0
3 years ago
What provides access to the internet?
Sphinxa [80]
A router!
12345678901234567890
6 0
3 years ago
All of the following are helpful test taking strategies EXCEPT_______________.
guajiro [1.7K]
Complete The test as quickly as possible
6 0
3 years ago
Read 2 more answers
Other questions:
  • Java
    14·1 answer
  • What is the importance of Mathematical Modeling in the field of bioinformatics.
    8·1 answer
  • Select the correct answer.
    6·2 answers
  • Gta! ! ! !!aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
    11·2 answers
  • Give two advantages of representing integers in pure binary.
    5·1 answer
  • Define the function max2 that takes two integers as arguments and returns the largest of them. Then define the function max_list t
    11·1 answer
  • Alice and Bob decide to communicate using NTRUEncrypt with parameters (N, p, q) = (7, 3, 29). Alice’s public key is h(x) = 3 + 1
    15·1 answer
  • For each obstacle, select the best solution. failing to find other members for a club: failing a class: failing to get the credi
    9·2 answers
  • Any action that causes harm to your computer is called a
    15·1 answer
  • What instructions would a computer have the hardest time completing correctly
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!