1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
azamat
3 years ago
7

CODEHS 3.5.4 Obi-Wan Says

Computers and Technology
1 answer:
Likurg_2 [28]3 years ago
5 0

The program receives inputs for the name, number of droids and wookiees a user wants and displays the information as a complete sentence. The program written in python 3 goes thus :

name = input('Enter name : ')

<em>#</em><em> </em><em>prompts</em><em> </em><em>user</em><em> </em><em>of</em><em> </em><em>name</em><em> </em>

num_droid = int(input('number of droids : '))

<em>#prompts</em><em> </em><em>for</em><em> </em><em>number</em><em> </em><em>of</em><em> </em><em>droids</em><em> </em>

num_wooks = int(input('number of wookiees : '))

<em>#prompts</em><em> </em><em>for</em><em> </em><em>number</em><em> </em><em>of</em><em> </em><em>wookiees</em><em> </em>

print(name, ' wants to meet', num_droid, 'droids and',num_wooks , 'Wookiees' )

<em>#displays</em><em> </em><em>the</em><em> </em><em>information</em><em> </em><em>as</em><em> </em><em>a</em><em> </em><em>complete</em><em> </em><em>sentence</em><em> </em>

<em>A</em><em> </em><em>sample</em><em> </em><em>run</em><em> </em><em>of</em><em> </em><em>the</em><em> </em><em>program</em><em> </em><em>is</em><em> </em><em>attached</em><em> </em>

<em>Learn</em><em> </em><em>more</em><em> </em><em>:</em><em> </em><em>brainly.com/question/25506437</em>

You might be interested in
The computer virus is simply a.......... a. diseases b.set of computer instrustruction or code c. types of bacteria​
Svetllana [295]

Answer: b

The computer virus is simply a ___

b. Set of computer instructions or code

4 0
3 years ago
Given the following data definition
Mashcka [7]

Answer:

Array + 36.

Explanation:

The array contains the address of the first element or the starting address.So to find the address of an element we to add the size*position to the starting address of the array.Which is stored in the variable or word in this case.

There are 9 elements in the array and the size of integer is 4 bytes.So to access the last element we have to write

array + 4*9

array+36

4 0
3 years ago
When powering up a home network, make sure all computers and peripherals are turned on before turning on the modem/router?
vazorg [7]
<span>the statement that when powering up a home network, make sure all computers and peripherals are turned on before turning on the modem/router is false.
The network devices like computers and other peripherals do not have to turned on before turning on the modem, they can be also later turned on.</span>
4 0
3 years ago
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Suppose your parents are planning to take you
Verdich [7]

Answer:

I think the answer would be a smartphone, hope this helps! Comment if I am wrong

4 0
3 years ago
Other questions:
  • Brandon purchased a new processor online as an upgrade. When he purchased the processor, he made sure that it used the same sock
    14·1 answer
  • ​In addition to joint application development, another popular user-oriented method is _____, which resembles a condensed versio
    14·1 answer
  • Clarisse is setting the white spaces at the edge of her Word document to be 1 inch. She is setting the _____.
    7·1 answer
  • The process of sending ping requests to a series of devices or to the entire range of networked devices is called a:
    9·1 answer
  • Which of the following commands would you use to start the program Main with four strings? a. java Main arg0 arg1 arg2 arg3 b. j
    11·1 answer
  • The term computer ________ is used to describe someone who is familiar enough with computers to understand their capabilities an
    12·1 answer
  • What are the words that make up a high-level programming language called?
    6·1 answer
  • . In the ____, you justify acquiring newer and better resources to investigate computer forensics cases.
    14·1 answer
  • The Carolina International School is more Earth-friendly than typical schools because
    7·1 answer
  • Assuming a single-processor system, that load and store are atomic, that x is initialized to 0, and that x must be loaded into a
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!