1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
labwork [276]
2 years ago
11

Assign total_owls with the sum of num_owls_A and num_owls_B.

Computers and Technology
1 answer:
zavuch27 [327]2 years ago
8 0

To debug a code, means that we locate and fix the errors in a code.

The issue with your code is that:

<em>You did not convert num_owls_A and num_owls_B to integers, when adding them together.</em>

The fix to this is that:

<em>You need to convert num_owls_A and num_owls_B to integers, when adding them together.</em>

The fix is as follows:

<em>total_owls = int(num_owls_A) + int(num_owls_B)</em>

The updated code is as follows:

<em>total_owls = 0 </em>

<em>num_owls_A = input() </em>

<em>num_owls_B = input() </em>

<em>total_owls = int(num_owls_A) + int(num_owls_B) </em>

<em>print('Number of owls:', total_owls)</em>

<em />

<em>The above code will perform addition operations for all inputs</em>

Read more about Python programs at:

brainly.com/question/13246781

You might be interested in
_________ are the special effects that you see when one slide changes to another in slide show view​
lisabon 2012 [21]

Answer:

Transition effects

Explanation:

Transition effects are the special effects you see when one slide changes to another in slide show view.

8 0
3 years ago
Please explain what steps you will take to prevent hackers from getting access to your personal information.
yuradex [85]
The steps I would take are 1. Making a strong password with symbols and numbers. 2. I will set up a 2 way authentication ther for if someone would be trying to hack me I would get an alert in order to stop the attempt. 3 I will not use the same password each time.
4 0
3 years ago
What is active server page ?or why is it important?
Thepotemich [5.8K]
For Example,
If You Were Hosting Ark Survival And Suddenly The Server Was Off Then The Players Goes Off.The Server Is How We Connect To The Platform In Order To Do The Action Intended.
5 0
3 years ago
Which managed service should you use if you want to do a lift and shift of an existing Hadoop cluster without having to rewrite
Viefleur [7K]

The managed service should you use if you want to do a lift and shift of an existing Hadoop cluster without having to rewrite your Spark code is f G. Cloud's.

<h3>What is Lift and shift Hadoop clusters?</h3>

This is one where a person can migrate their existing Hadoop and Spark deployment so that they can use G. Cloud without  having to engage in re-architecting.

The managed service should you use if you want to do a lift and shift of an existing Hadoop cluster without having to rewrite your Spark code is f G. Cloud's as it is advantage fast and flexible way to put together infrastructure as a service and others.

Learn more about  managed service from

brainly.com/question/20495853

#SPJ1

3 0
2 years ago
Which port security violation mode does not generate messages or increment the violations counter?
Zanzabum

The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

<h3>What is  offence?</h3>

A deviation from a code of conduct or law is referred to as a violation. When driving a car, going over the posted speed limit is a regular legal violation. Invading someone else's privacy could include reading their journal. failure to uphold a duty or right; breaching the law.

The two types of violations are states and acts. A transgression is a violation of the rules that is less serious than a foul and frequently involves technicalities of the game. A disrespectful or vulgar act: profanation.

Hence, The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

To learn more about violation, refer to:

brainly.com/question/1274113

#SPJ4

4 0
2 years ago
Other questions:
  • What is the f(n) runtime of the following pseudocode: sum-0 for A = N/2 downto 1 for B-1 t increment sum by B Explain: exactly w
    13·1 answer
  • It is a function that ends the connection to the database.
    9·2 answers
  • When you’re in the Normal view, what are the visible panes?
    15·2 answers
  • Given an array as follows
    11·1 answer
  • Write a function that, given an array A of N integers, of which represents loads caused by successive processes, the function sh
    15·1 answer
  • What computer is designed to meet the computing needs of several people simultaneously in a small to medium-size business enviro
    5·1 answer
  • adding ______around calculations indicates which calculations should be performed first before following the typical order of op
    6·1 answer
  • Need help fast this is do a 4
    5·1 answer
  • Who Is faster sonic or flash well it all depends on which version of sonic your talking about like for example video game sonic,
    14·1 answer
  • When dividing it’s total debt by total equity what’s a company trying to measure
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!