1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wel
3 years ago
10

Need help coding this it uses input and I need to use the words good and morning

Computers and Technology
1 answer:
Masja [62]3 years ago
6 0

Answer:

x = input ("Enter a word: ")

y = input ("Enter a word: ")

print ( x, " ", y)

Explanation:

This is the simplest way to write it using Python.

You might be interested in
Which of the following statements regarding EFT is false? EFT still requires the endorsement of a check EFT allows payment to be
hammer [34]

A smart way of moving money from one personal banking account directly to another account is called EFT or electric fund transfer. There is a maximum clearance time of 24 hours for transfer.  The most widely-used program is Direct Deposit, in which payroll is deposited straight into an employee's bank account initiated through an electronic terminal, including credit card, Therefore, the following<span> statement regarding EFT is false?</span>

<span>1.                  </span><span>EFT still requires the endorsement of a check </span>

3 0
3 years ago
A ________ database state is one in which all data integrity constraints are satisfied
beks73 [17]
A consistent database base is one in which all data integrity constraints are satisfied.
8 0
3 years ago
Read 2 more answers
Describe the key differences between raster-based and vector-based graphics.
Kazeer [188]

Answer:

asd

Explanation:

8 0
3 years ago
Your network administrator finds a virus in the network software. Fortunately,
Over [174]
B. vulnerability

It’s considered a vulnerability because the administration should have had security protections on the network.
8 0
3 years ago
Brief definition for what is emerging technologies?
cupoosta [38]

Answer: The progressive Development within a field.

Explanation: ...

8 0
3 years ago
Other questions:
  • A foreign country attempting to access government networks in order to disable a national power grid would be an example of: Sel
    7·2 answers
  • What port does the DarkComet malware listen on?
    15·1 answer
  • If a device does not require a driver, it is _____.
    6·1 answer
  • Battery maker Duracell introduced a new product called the Duracell Powermat, which is a wireless charging pad for mobile device
    12·1 answer
  • The two main methods of verification
    6·1 answer
  • What are possible challenges for cyber bullying
    6·2 answers
  • 20. When you see ##### in a cell, you should
    8·1 answer
  • Assume that d is a double variable. Write an if statement that assigns d to the int variable i if the value in d is not larger t
    13·1 answer
  • Where deep convolutional neural network is used in real life
    13·1 answer
  • Which of the following security policies can be implemented to prevent removable media from automatically launching potentially
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!