1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sholpan [36]
3 years ago
8

I'm getting pretty desperate plz help me, I'll give brainiest, and ill make a free question worth 100 points this is for coding

FLVS fine ill put it 100 plz help meee
Part 1: Plan and Write the Pseudocode
Using pseudocode, write an algorithm that someone else can follow.
Decide on a question to ask the user. Some ideas include:
What grade are you in?
What sport do you play?
Where did you go on vacation?
Use one variable to store the response.
Use one if-else statement to make a decision based on the user's input.
Display two messages; one for each condition (True and False).
Insert your pseudocode here: (you only need to do one)
Flowchart
Write it out

Get input:

If statement:

Print if true:

Print if false:


Part 2: Code the Program
Use the following guidelines to code your program.
Use the Python IDLE to write your program.
Using comments, type a heading that includes your name, today’s date, and a short description.
Set up your def main(): statement. (Don’t forget the parentheses and colon.)
Write one if-else statement using user input.
Include a print message for both conditions (True and False).
Conclude the program with the main() statement.
Follow the Python style conventions regarding indentation in your program.
Run your program to ensure it is working properly. Fix any errors you may observe.
When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE. When you submit your assignment, you will attach this Python file separately.

Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.
Review Question
Response
What was the purpose of your program?

How could your program be useful in the real world?

What is a problem you ran into, and how did you fix it?

Describe one thing you would do differently the next time you write a program.




Part 4: Save Your Work
Don't forget to save this worksheet. You will submit it for your assessment.

you can also give me a link to your work and ill use it as a guide I will not copy
my g mail is my user name
Computers and Technology
2 answers:
Alecsey [184]3 years ago
7 0

Answer:

give other guy brainliest

EastWind [94]3 years ago
3 0

Answer:

What grade are you in?

Explanation:

Sorry , i typed up a ton of stuff but this it don't let me answer it because there is something wrong with it

You might be interested in
P2p networks are most commonly used in home networks. <br> a. True <br> b. False
postnew [5]
<span>The statement that P2P networks are most commonly used in home networks is true. 
</span>P2P stands for peer-to-peer communication network. It is an example of local administration. <span> Two or more PCs share files and access to devices such as printers without requiring a separate server computer or server software with P2P type of network.</span>
6 0
3 years ago
When you are making multiples of a brownie recipe, you cannot - without great difficulty - use a fraction of an egg. The calcula
Lera25 [3.4K]
The answer is one ☝️ question for the poll of a vote
5 0
3 years ago
__________ states that network connection speeds for high-end users will increase by 50 percent per year, enabling new companies
Liula [17]

Answer:

Nielsens law

Explanation:

4 0
1 year ago
The area around the outside of the page where normally no text or images appears is called the ______.
SSSSS [86.1K]
The answer should be A, I'm unsure how to explain this to you, sorry, but I hope you remember this for future reference
6 0
3 years ago
When a peanut farmer adds value to his peanuts by turning them into creamy peanut butter, the farmer is engaging in which of the
Neporo4naja [7]

Answer:

The correct options are;

The security administrator makes sure to shred and properly dispose of any printed confidential information

The security administrator uses password-protected files and folders on his work computer

Explanation:

A company's policies as written in the employee manual, with regards to confidentiality, generally includes provisions and procedures on how to handle confidential information, including the requirement for the shredding of of printed confidential information that are to be disposed, such as information about the way the company operates, the earnings of the company and employee records

Password protection keeps confidential files and folders from being able to be accessed by people without the prerequisite authority, which ensures the confidentiality of the company's information is maintained.

3 0
3 years ago
Other questions:
  • To type the letter address, _________ space from the dateline
    9·2 answers
  • Lewis is using a stylus with his touch screen computer in order to draw a
    8·1 answer
  • What does it mean to say that two variables are negatively correlated?
    6·1 answer
  • The ____________ mechanism consists of a lever arm attached to the mousetrap spring.
    15·1 answer
  • When your friend DaJuan turns on his computer, he hears four beeps. The computer won’t fully boot. DaJuan has a Dell computer wi
    7·1 answer
  • Explain the paging concept and main disadvantages of pipelined
    15·1 answer
  • Once the CPU has fetched the data requested, what are the next steps in the process?
    15·1 answer
  • What are the three main elements common to all radio ads?
    9·2 answers
  • What type of purchase requisition is used to turn-in a recoverable/reparable material to the ssa?
    13·1 answer
  • 9- Write a program in MARIE to add three numbers.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!