1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zimovet [89]
3 years ago
12

8.10 Code Practice Question 1

Computers and Technology
1 answer:
Dmitriy789 [7]3 years ago
6 0

x = input("Enter a word: ")

y = input("Enter a word: ")

x,y = y, x

print(x)

print(y)

I hope this helps

You might be interested in
In the picture below
zhuklara [117]

Answer:

The answer is "It is a public method in the Car class".

Explanation:

In this question, the fourth choice is correct because the accessor method will be public, and the incorrect choice can be defined as follows:

  • The first and second choice was wrong because the class name is "Car".
  • In the third choice, it is wrong because the method will not be private.
  • In the fifth choice, it is wrong because the object name "mustang".
7 0
3 years ago
CORRECT ANSWER GETS BRAINLIEST
guajiro [1.7K]

I saw that all of them are correct. In 1905, the Wright Brothers flew their plane for 39.5 minutes. In 1969, Neil Armstrong landed on the moon. And the Wright brothers went throughout the U.S and Europe to demonstrate their plane. I hope this helps.

7 0
3 years ago
Read 2 more answers
Which of the following gestures would you use if you want to activate a link on your new tablet?
Gre4nikov [31]

Answer:

press and hold

Explanation:

When you press and hold, some open a menu where you can add a link

8 0
3 years ago
Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
12345 [234]

Answer:

Identity Theft

Explanation:

Identity theft is the act of someone who obtains details about someone else illegally.  This is done to find personal and financial information such  name, address,social security number, passwords, and credit card number, phone number, e-mail, etc. Then the hacker can use this information to control bank accounts, e-mails, computers, portray himself as you are, or sell information to someone else.

3 0
3 years ago
You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workst
vichka [17]

Answer:

Ping

Explanation:

If working in an environment that uses Linux and Windows servers and the network using IP protocol, if an application you are using is unable to to connect to a windows server named FileSrv2, you will need to test network connectivity between your workstation and the server by using either the "ping" or "traceroute" command.

3 0
3 years ago
Other questions:
  • What does the line of red semicircles mean on a weather map
    11·1 answer
  • From the following list choose all the tasks an operating system performs.
    5·2 answers
  • ________ is a publicly accessible website that allows users to add and edit interlinked web pages and make contributions from th
    8·2 answers
  • Where can i make an animation for free?
    10·1 answer
  • What is signature in an E-mail​
    10·1 answer
  • 5. In which of the following stages of the data mining process is data transformed to
    9·1 answer
  • The US government appropriates less than one million dollars in funding each year to STEM education programs. True False
    7·2 answers
  • Please please help I don’t understand this please.
    11·1 answer
  • HC - AL-Career Preparedness
    8·1 answer
  • Creating a website is called web ________.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!