1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tekilochka [14]
2 years ago
8

If anyone knows how to code on python:

Computers and Technology
1 answer:
Allushta [10]2 years ago
5 0

Answer:

def dice_roller():

   # ask for first input

   input1 = int(input("Enter the first roll: "))

   # check if it's valid

   while input1 < 1 or input1 > 6:

       print("Invalid number")

       # ask for new input if the previous was invalid

       input1 = int(input("Enter the first roll: "))

   # ask for second input

   input2 = int(input("Enter the second roll: "))

   # check if it's valid

   while input2 < 1 or input2 > 6:

       print("Invalid number")

       # ask for new input if the previous was invalid

       input2 = int(input("Enter the second roll: "))

   # check of the numbers are the same

   if input1 == input2:

       print("You rolled the same numbers. Try again")

       # if they are the same call this function again to get new numbers

       dice_roller()

   else:

       # print how many spaces to advance

       print("Advance", input1+input2, "spaces")

if __name__ == '__main__':

   dice_roller()

Download txt
You might be interested in
What is the most recent version of Microsoft Windows?
yuradex [85]

Answer:

I believe it is windows 8

7 0
2 years ago
Read 2 more answers
I need help picture above
sammy [17]

Answer:

True

Explanation:

hoped I helped Im Eve btw Have a great day and consider marking this brainliest if you do thank you in advanced!

6 0
3 years ago
Read 2 more answers
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replic
mihalych1998 [28]

Answer:

The answer is "Option D".

Explanation:

Trojan program is a malicious code that is also known as a virus. It is a rootkit, that aims to infect the computer to hide or obscure an object. These programs are mainly used to download additional content, such as additional pieces of malware, to the infected computer, and other options are wrong that can be defined as follows:

  • In option A, It is not correct, this option infects the system.
  • In option B, It is used for infects another computer that's why it is incorrect.
  • In option C, It is incorrect because it is used in cybersecurity.  
5 0
3 years ago
What is the difference between the paste and paste special options
Darina [25.2K]

Paste special allows the item being transferred to be formatted in several different ways. Paste is just going to be transferred the exact way you copied it.

7 0
3 years ago
An operating system can be categorized according to: question 1 options:
9966 [12]

Answer:

An operating system can be categorized according to both the given options. Thus answer is option C

Explanation:

An operating system should support multiple logins. Because the login plays a major role and that is the need and mainly in the organization where one system will be shared by multiple users. Also, Operating system should perform multi-tasking. This efficiency is required so that the user completes the work very faster and he need not wait to go for the next task.

For example an operating system handles user’s task, background tasks, keep track of the status of the devices, allots output device to the requested user and so on.  

5 0
2 years ago
Read 2 more answers
Other questions:
  • How do social media sites illustrate kindness?
    15·1 answer
  • Your health insurance company gives you a discount if you wear a fitness-tracking bracelet. After wearing it for a few months, y
    5·1 answer
  • How are clustering and Network Load Balancing similar?
    13·1 answer
  • If K is a foreign key in relation R1, then
    10·1 answer
  • How to understand amortized analysis potential?
    12·1 answer
  • Each of the outcomes listed below is a result of executing the following script except for one. Which one? CREATE ROLE ExampleRo
    6·1 answer
  • Question # 2
    7·1 answer
  • I need some help with this assignment. I'm having difficulty trying come up ideas to use here. Can I get any help?
    5·1 answer
  • What is modularity?
    9·1 answer
  • 1k bits equals to how many bits
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!