1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sholpan [36]
3 years ago
8

I'm getting pretty desperate plz help me, I'll give brainiest, and ill make a free question worth 100 points this is for coding

FLVS fine ill put it 100 plz help meee
Part 1: Plan and Write the Pseudocode
Using pseudocode, write an algorithm that someone else can follow.
Decide on a question to ask the user. Some ideas include:
What grade are you in?
What sport do you play?
Where did you go on vacation?
Use one variable to store the response.
Use one if-else statement to make a decision based on the user's input.
Display two messages; one for each condition (True and False).
Insert your pseudocode here: (you only need to do one)
Flowchart
Write it out

Get input:

If statement:

Print if true:

Print if false:


Part 2: Code the Program
Use the following guidelines to code your program.
Use the Python IDLE to write your program.
Using comments, type a heading that includes your name, today’s date, and a short description.
Set up your def main(): statement. (Don’t forget the parentheses and colon.)
Write one if-else statement using user input.
Include a print message for both conditions (True and False).
Conclude the program with the main() statement.
Follow the Python style conventions regarding indentation in your program.
Run your program to ensure it is working properly. Fix any errors you may observe.
When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE. When you submit your assignment, you will attach this Python file separately.

Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.
Review Question
Response
What was the purpose of your program?

How could your program be useful in the real world?

What is a problem you ran into, and how did you fix it?

Describe one thing you would do differently the next time you write a program.




Part 4: Save Your Work
Don't forget to save this worksheet. You will submit it for your assessment.

you can also give me a link to your work and ill use it as a guide I will not copy
my g mail is my user name
Computers and Technology
2 answers:
Alecsey [184]3 years ago
7 0

Answer:

give other guy brainliest

EastWind [94]3 years ago
3 0

Answer:

What grade are you in?

Explanation:

Sorry , i typed up a ton of stuff but this it don't let me answer it because there is something wrong with it

You might be interested in
How is a source file different from a "listing file"?
S_A_V [24]
E-filing<span> technical information - acceptable native (or </span>source<span>) electronic </span>file<span> format types. ... Whenever possible, the electronic </span>source<span> files used to create the PDF should be uploaded after the PDF in the same </span>filing<span>. Multiple </span>source<span> files can be uploaded in the same </span>filing<span>.</span>
8 0
3 years ago
Was LDAP version2 an internet standard in 1998? is it now?
mamaluj [8]

Answer Explanation:

LDAP stand for lightweight directory access protocol 389 is its port number it is an application layer protocol it was first invented in march 1998 and become very popular widespread  internet standard in august 1998 its authentication method is very simple the client send user name and password to LDAP server to access this.

4 0
3 years ago
In a study of 1228 randomly selected medical malpractice​ lawsuits, it was found that 856 of them were dropped or dismissed. Use
ale4655 [162]

Answer:

<u>Hypothesis</u><u> </u>

H o : No difference between proportions

H 1 : There is a significant difference between proportions

n = 1228

b = 1228 - 856

b = 375

Since n ≥ 25

b = {( a + 0.5 ) - n/2 }\  ( √n )/2

   = {( 372 + 0.5 ) - 1228/2 }\ ( √1228 )/2

   = - 13.789

  • from table : A-2
  • p-value is 0.000
  • given significance level is α = 0.01
  • p-value is less than significance level hence there is enough evidence to reject null hypothesis
  • Which means there is a significance difference between the proportion of lawsuits that go to trail which should be dismissed
4 0
4 years ago
A ____________would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a_____________
seraphim [82]

Answer:

The answer to this question is vulnerability and risk.

Explanation:

Vulnerability is there us misconfiguration in the system  and we know that our system is vulnerable means the hacker can gain unauthorized access to our system.

Risk is when there are chances that a misconfiguration  might happen in our system in future so that hacker could gain unauthorized access to the system.

7 0
3 years ago
Which Internet of Things (IoT) challenge involves the difficulty of developing and implementing protocols that allow devices to
Firlakuza [10]

Answer: Interoperability

Explanation:

Interoperability is the skill in system that helps in communicating and exchanging information and services with each other.It can be used in various industries and platform as the task is performed without considering specification and technical build.

  • IoT(Internet of things) interoperability faces various challenges like standardization, incompatibility etc.Several steps are taken to for IoT equipment to deal with servers, platforms,applications, network etc.
  • Interoperability provides appropriate measure for enhancement of IoT devices .
6 0
3 years ago
Other questions:
  • All phones must have a way of making and then terminating a connection to the phone network; however the exact procedure for doi
    6·1 answer
  • Write a short program using a while loop which will display all of the even numbers starting with 12 and ending with 86. (test y
    10·1 answer
  • Which is the highest level of the hierarchy of needs model?
    7·2 answers
  • What is important for an internet user to know about https:// ?
    9·1 answer
  • Which choice lists two image formats that support transparency
    6·2 answers
  • eplace the underlines with the words in parentheses that follow: The ____ solves the ____ of a ____ by expressing an ____ in a _
    5·1 answer
  • Which of the actions below will not create more room on your hard drive?
    13·1 answer
  • Consider two different implementations, M1 and M2, of the same instruction set. There are three classes of instructions (A, B, a
    14·1 answer
  • . Use of communications and information systems that are familiar to users is a part of which key principle? A. Security
    14·2 answers
  • Each AWS region is composed of two or more locations that offer organizations the ability to operate production systems that are
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!