1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Thepotemich [5.8K]
3 years ago
9

Write a program that get

Computers and Technology
1 answer:
densk [106]3 years ago
5 0

Answer:

people = list(map(int, input().split()))  # gets input and makes them into an integer

for i in range(len(people)):

   if 0 <= people[i] <= 5:

       print('Baby')  # You didn't specify how you want to 'store' the info, but I'm just going to print it out

   elif 6 <= people[i] <= 17:

       print('Teen')

   elif 18 <= people[i]:

       print('Adults')

Explanation:

This is the basic structure of the code. This is written in Python 3x. If you are writing in a different language, then just use the template given to you!

You might be interested in
Key Categories: more libraries and thousands of functions
Vadim26 [7]

Answer:

2b2t

Explanation:

2b2t

6 0
3 years ago
Trudy is preparing a reply to an email message. Before she could send out the message, she is called for a meeting. If Trudy has
Ronch [10]
Her Drafts folder. Hope this helped!
3 0
3 years ago
Read 2 more answers
1. Which of the following is not a question that should be asked when planning a Windows Server 2019 installation?
sashaice [31]

Answer:

1 B 2 C and B 3 True

Explanation:

3 0
3 years ago
When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework
Brilliant_brown [7]

Answer:

In order to observe best practices, and to meet with technical and other requirements, organizations often use frameworks for cybersecurity compliance and regulatory compliance. These frameworks provide best practices and guidelines to assist in improving security, optimizing business processes, meeting regulatory requirements, and performing other tasks necessary to achieve specific business objectives such as breaking into a particular market niche or selling to government agencies.

Many such frameworks exist, and the recommendations set out in them can impose difficult and often expensive demands on enterprise resources – especially in situations where an organization is subject to a number of regulatory compliance regimes, whose requirements it has to meet while maintaining its own strong cybersecurity status.

Explanation:

4 0
3 years ago
What job titles describes a person with green engery? in career clusters
Amiraneli [1.4K]

Answer:

environmental scientist

Explanation:

8 0
3 years ago
Other questions:
  • In 2-5 paragraphs, describe the points that Kendra needs to consider when choosing a telecommunications technology to meet her n
    6·1 answer
  • What are some ways in which reading and writing have changed in our newly networked world
    10·1 answer
  • The smallest unit of storage in the following list is a
    7·1 answer
  • In a flow chart, both the decision structure and the repetition structure use the diamond symbol to represent the condition that
    9·1 answer
  • What are the dimensions (width and height) of the largest image we can make with the pixelation widget?
    8·1 answer
  • What does the memory controller prevent
    5·2 answers
  • I have answered 22 questions and my messages are still not working what is it that i'm doing wrong?
    6·1 answer
  • True or false Encryption prevents hackers from hacking data?
    8·1 answer
  • What would be an ideal scenario for using edge computing solutions? a regional sales report uploaded to a central server once a
    14·1 answer
  • What is computer virus?​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!