1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
azamat
3 years ago
7

CODEHS 3.5.4 Obi-Wan Says

Computers and Technology
1 answer:
Likurg_2 [28]3 years ago
5 0

The program receives inputs for the name, number of droids and wookiees a user wants and displays the information as a complete sentence. The program written in python 3 goes thus :

name = input('Enter name : ')

<em>#</em><em> </em><em>prompts</em><em> </em><em>user</em><em> </em><em>of</em><em> </em><em>name</em><em> </em>

num_droid = int(input('number of droids : '))

<em>#prompts</em><em> </em><em>for</em><em> </em><em>number</em><em> </em><em>of</em><em> </em><em>droids</em><em> </em>

num_wooks = int(input('number of wookiees : '))

<em>#prompts</em><em> </em><em>for</em><em> </em><em>number</em><em> </em><em>of</em><em> </em><em>wookiees</em><em> </em>

print(name, ' wants to meet', num_droid, 'droids and',num_wooks , 'Wookiees' )

<em>#displays</em><em> </em><em>the</em><em> </em><em>information</em><em> </em><em>as</em><em> </em><em>a</em><em> </em><em>complete</em><em> </em><em>sentence</em><em> </em>

<em>A</em><em> </em><em>sample</em><em> </em><em>run</em><em> </em><em>of</em><em> </em><em>the</em><em> </em><em>program</em><em> </em><em>is</em><em> </em><em>attached</em><em> </em>

<em>Learn</em><em> </em><em>more</em><em> </em><em>:</em><em> </em><em>brainly.com/question/25506437</em>

You might be interested in
1. Which is not a cold sandwich?
Virty [35]

Answer:

D. Grilled sandwich

Explanation:

Grilled sandwich is a kind of hot sandwich.

5 0
3 years ago
What is output by the following code?
Inessa05 [86]
When numbers are divided, the integer portion is kept and the remainder is disregarded (meaning 10/9 would return 1). Following this format, we get the answer of <span>6 6 6 3 7 7 9 5 8 8. 
I also see that this program can be optimized because you use the same for loop twice, and both of them manipulate list elements in some way. A more optimized program would be:

</span><span>int a [] = {64 , 66 , 67 , 37 , 73 , 70 , 95 , 52 , 81 , 82};

for (int i = 0; i < a.length; i++) {
  a[i] = a[i] / 10;
  </span>System.out.print(a[i] + " ");<span>
}

Or maybe you don't need to store the list values for later on. You could do:

</span>for (int i = 0; i < a.length; i++) {
  System.out.print(a[i] / 10 + " ");
}

In any situation, your answer is choice 2.
8 0
3 years ago
Identifying and preventing incorrect claim payments and fraudulent activities falls under which type of data mining applications
Assoli18 [71]

The act of knowing incorrect claim payments and fraudulent activities falls under insurance type of data mining applications.

<h3>How is data mining used?</h3>

Data mining is known to be a tool that is often used by lots of insurance providers as it helps them to be able to know or predict the claims that are fraudulent so that one can be able to rightly target their resources and recoup a good amounts of money.

Conclusively, the act of Identifying and preventing incorrect claim payments and fraudulent activities falls under insurance type of data mining applications as it helps handles all issues regarding the above.

Learn more about data mining applications from

brainly.com/question/2596411

7 0
2 years ago
Secure software development: a security programmer's guide by jason grembi isbn-10: 1-4180-6547-1, isb-13: 978-1-4180-6547
a_sh-v [17]

Secure software development is known to be a kind of methodology (often linked with DevSecOps) for making software that incorporates a lot of security into every stage of the software development life cycle (SDLC).

<h3>What is secure software development practices?</h3>

Secure software development is  seen as a method that is used form the creation of a lot of software that uses both security into all of the phase of the software development making cycle.

This book is known to be  A Programmer's Guide that can be able to  leads readers in all of the tasks and activities that one can do to be successful computer programmers and it is one that helps to navigate in the area of reading and analyzing requirements as well as choosing development tools, and others.

Hence, Secure software development is known to be a kind of methodology (often linked with DevSecOps) for making software that incorporates a lot of security into every stage of the software development life cycle (SDLC).

Learn more about  Secure software development  from

brainly.com/question/26135704

#SPJ1

7 0
2 years ago
¿Como ha impactado el transporte y su perfeccionamiento la vida de las personas?
Jobisdone [24]

Answer:

Las instalaciones y actividades de transporte afectan los patrones de desarrollo de la comunidad.

Explanation:

7 0
3 years ago
Other questions:
  • Speech on inventors and inventions
    14·1 answer
  • The answer is family and friends
    8·2 answers
  • Which of these YA (young adult movies is not base on a book is it A wrinkle in time, or Midnight sun,or Love,simon.
    6·1 answer
  • Imagine that the following two lines of code are placed inside a
    11·1 answer
  • How does the speaker feel about traditional forms of poetry
    14·2 answers
  • In vehicles equipped with ABS, the driver's foot must remain firmly on the ... to activate the ABS.
    13·1 answer
  • Assignment Guidelines
    12·1 answer
  • Which of these words is used to begin a conditional statement?<br> when<br> input<br> if<br> until
    8·1 answer
  • Ray owns a gaming cafe where users can play video games on computers. These games involve rich graphics and need high processing
    5·1 answer
  • How would you create a loop that never ends?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!