1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksenya-84 [330]
3 years ago
10

What is elif? How does it work in python?

Computers and Technology
2 answers:
Savatey [412]3 years ago
6 0
Use the elif condition is used to include multiple conditional expressions after the if condition or between the if and else conditions
pav-90 [236]3 years ago
5 0
It is the condition used after the if condition. say you use the if condition and you need to add another outcome, instead of using the if condition again, you’d use elif and end it with the else command.

example:

if num == 10:
print (“correct”)

elif num > 10:
print (“too high”)

else:
print (”too low”)

hope this helps :]
You might be interested in
___ Jacking is a crime that takes place when a hacker misdirects URL to a different site. The Link Itself Looks Safe, But the us
const2013 [10]

Answer: Web Jacking

Here, the hacker takes control of a web site fraudulently. He may change the content of the original site or even redirect the user to another fake similar looking page controlled by him.


If you have any other questions about computers or even hacking hit me up because I know a lot about computers

6 0
3 years ago
In the space below, explain how the Table Tools can be accessed
ZanzabumX [31]

Answer:

Click in the cell (or select multiple cells) that contains text you want to align. The Table Tools tab appears. Click the Layout tab under the Table Tools heading. … If you change the alignment of blank cells, any new text you type in those blank cells will appear according to the alignment you choose.

Explanation:

3 0
3 years ago
What are the five steps of ethical hacking?
Paraphin [41]

Answer

Explanation:

Hacking is simply gaining access into a computer through weaknesses that were found in the network system.

We have mainly 5 stages In ethical hacking which although must not be followed sequentially but could produce greater results if it was followed.

These stages includes

1. Reconnaissance

2. Scanning

3. Gaining access

4. Maintaining access

5. Covering tracks.

8 0
4 years ago
Charles would like to visit a specific page on the World Wide Web. How should he do it?
Ulleksa [173]
Charles should type in Https:web.com but should visit the sites containing ".org,".Gov'" and make sure they've been updated recently. 
 He should also check for authors and dates. 
 Or he can go to a library online if he is doing a research paper.


4 0
3 years ago
SELECT vendor_name, COUNT(*) AS number_of_invoices, MAX(invoice_total - payment_total - credit_total) AS balance_due FROM vendor
grigory [225]

Answer:

Option a is the correct answer for the above question.

Explanation:

  • The above question asked about the order of the result which is derived from the above query. The above query holds an order by clause in desc order which is used to produce the result in descending order.
  • The descending order result is produced on the behalf of balance_due attributes and the option a also states the same. Hence option a is correct while the other is not because:-
  • Other is not states that the result is produced on the behalf of descending order.
4 0
4 years ago
Read 2 more answers
Other questions:
  • _____ are unique identifiers of computer or network addresses on the internet.
    6·2 answers
  • Is using abbreviations and symbols in social media a problem? Why or why not?
    11·1 answer
  • When studying an information system, illustrations of actual documents should be collected using a process called _____.
    12·1 answer
  • Do you think robots will take millions of jobs when they're put in different positions such as doctors or taxi drivers?
    7·1 answer
  • Which of the following occupations is the most likely o require working weekends and night shifts
    11·2 answers
  • What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
    13·2 answers
  • Does anyone know how I can "guest browsing" when it's blocked ?
    7·1 answer
  • In a school 50% of the students are younger than 10, 1/20 are 10 years old and 1/10 are older than 10 but younger than 12, the r
    7·1 answer
  • What is contained in the Open Files section of Shared Folders? ​
    13·1 answer
  • list three things that can spoil a printer if they are not of the correct specification and what damage may be caused​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!