1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
3 years ago
11

You are testing a classmate’s program. The program asks you how many times you want to play the game, and you input “five.” You

get the following error message: “ValueError: invalid literal for int() with base 10: 'five.'” What line of code could prevent this problem in the future?
Computers and Technology
1 answer:
Svetach [21]3 years ago
7 0

Answer:

5 time

Explanation:

because I am in school tell study

You might be interested in
................,...
docker41 [41]

Answer:

there's a comma

Explanation:

after all those periods

6 0
4 years ago
Which of these actions would NOT help you organize data efficiently?
Ilya [14]
The answer is Storing files on your desktop so that you can locate them easily
Hope this helps! :)
3 0
3 years ago
The __________ web site and list site seclists.org is home to the leading free network exploration tool, nmap.
maksim [4K]
The nmap.org website

Nmap is an open source utility for security auditing and network discovery. Many network admins also use it for networks inventory and monitoring host or service uptime. It uses raw IP packets in novel ways to determine what hosts are available on the network.


8 0
3 years ago
Read 2 more answers
Write down the pseudo code for a brute-force algorithm to compare elements in array A with elements in array B.
Thepotemich [5.8K]

Answer:

def brute_force(array1, array2):

   for item in array1:

       for element in array 2:

           if element == item:

               print(f"{element} and {item} are a match")

Explanation:

A brute-force algorithm is a direct-to-solution algorithm that searches and compares variables. It is like trying to unlock a safe but not knowing its four-digit combination, brute-force starts from 0000 through 9999 to get a match.

The python program implements the algorithm using two nested for loops. The first loop iterates over array1 while the second, over array2. For every item in the first array, the program loops through the length of the second array. For every match, the items are printed on the screen.

5 0
3 years ago
Design a database suitable for a university registrar. This database should include information about students, departments, pro
zalisa [80]

Answer:

For designing a database suitable for a University registrar, the following information is included which are Information about Students, Information about Departments, Information about Professors, Information about courses, Student Grades,TA's for a course, Department offering different courses.

In creating the database registrar system the following values are defined such as Entity, Attributes of entities,The relationship among entities.

Explanation:

Solution

The following requirements are for designing of database for  a University registrar.

The Database Schema includes the following:

  • Information about Students
  • Information about Departments.
  • Information about Professors.
  • Information about courses.
  • Student Grades.
  • TA's for a course.
  • Department offering different courses.

Now,

For the design of Database for Registrar System we need to define the following:

(1)Entity: Student, Course, Instructor, Course offering.

(2) Attributes of Entities:

  • Student entity has Sid, name, program as its attributes
  • Course has Course_n, title, credits, and syllabus as its attributes
  • Instructor has iid ,name ,dept, title as its attributes
  • Course offering has section_no ,time, room, year,semester as its attributes

(3) Relationship among various entities:

  • Enrolls
  • Teaches
  • © is offered

Note: kindly find an attached copy of the E-R Diagram for University Registrar below, and his diagram shows student entity enrolls various courses which can be having teaches relationship with instructor. Course is being offered by relationship is offered by course offering.

5 0
3 years ago
Other questions:
  • Drivers must always yield to emergency vehicles traveling
    9·1 answer
  • You need to test a condition and then execute one set of statements if the condition is true. If the condition is false, you nee
    9·1 answer
  • What government agency initially began the work with computers that would eventually lead to the development of the Internet?
    5·2 answers
  • Why is outfitting a workspace with video games in technology development company considered a strategic use of money
    8·2 answers
  • Two stations running TCP/IP are engaged in transferring a file. This file is 1000MB long, the payload size is 100 bytes, and the
    14·1 answer
  • Traditionally, remote administrative access on routers was configured using Telnet on TCP port 23. However, Telnet was developed
    8·1 answer
  • 1) Given what you have learned about computers and information technology thus
    6·1 answer
  • What kind of Base Error Rates are evident in more complex activities such as programming a computer? Select one: a. 2% b. 70% c.
    5·1 answer
  • :|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|:|
    5·2 answers
  • PLEASE ANSWER
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!