help me pls i beg whoever types first ill mark them brainliest

Help Me Pls I Beg Whoever Types First Ill Mark Them Brainliest
Help Me Pls I Beg Whoever Types First Ill Mark Them Brainliest

Answers

Answer 1

Answer:

The answer is "Line 1,4,and 9".

Explanation:

Following are the complete code to the given question:

print ("What is your favourite football team? ")#print message

team = input()#define variable that use input method to input value

#this is the IF statement, If they enter Manchester City

if team == "Manchester City":#use if to check string value

#respond like this

   print ("Manchester City is a great team! ")#print message

#alternatively, respond like this

else: #defining else block

   print("I don't mind "+ team +", but Manchester City is better !")#print message

   #don't forget concatenation!

output:

Please find the code with the output in the attached file.

Please find attached file that will explains errors.

Help Me Pls I Beg Whoever Types First Ill Mark Them Brainliest
Help Me Pls I Beg Whoever Types First Ill Mark Them Brainliest

Related Questions

list the steps involved in cutting and pasting in a different document​

Answers

To cut or copy, hold down Ctrl and press X or C. Choose Paste from the menu bar when you right-click the item's destination. You can right-click almost anywhere, including inside a document or folder. To paste, hold down Ctrl and press V on the keyboard.

this bar is located at the top of your computer school in.Its functions allow you to navigate the web​

Answers

Answer:

idu

Explanation:

The answer is Address bar

Software and technology that allow people to work together on a task are known as

Answers

Collaborative software or groupware.

Answer:

Collaborative software

can you help me here please​

Answers

Explanation:

because Anna is a music lover she had download lots of songs.When downloading songs a virus should have gone from the websites to her computer.

to avoid this problems she should not have gone through the different websites

Are DoS and DDos tactics appropriate for legitimate organizations to use against others? What fallout is considered appropriate fallout should an attack be used on others? Explain your answer.

Answers

Answer:

They are inappropriate

fallouts: Access denial and data theft

Explanation:

Dos ( denial of service ) and DDos ( distributed denial of service ) are inappropriate for legitimate organizations to use against each other. because DOS or DDos attacks are attacks on the server of an organization by sending an unusual amount of traffic to the server, thereby denying the devices and users connected to the server access to the server.

Access denial and data theft are the fallouts associated with DOS  and DDos attacks

MAN on metropolitan area network is a network spanning a large distances of a few kilometre like a city true or false​

Answers

Answer:

True

Explanation:

It is True

A sum of money is shared between 2 friends in the ratio 2 : 3. If the larger

share is $450. What is the total sum shared?

Answers

300! Is the answer for this problem. 450 is the bigger sum, and that’s the 3 part of the ratio. So when we divide 450 by 3 it gives us 150. 150 is what one point on the ratio stands for. We’re looking for what 2 points on the ratio is, so 150*2 which gives us 300 … hope this helps

four categories of installer apps

Answers

Answer:

I find 5 categories

Explanation:

1 Overview

2 Necessity

3 Types

4 Attended installation

4.1 Silent installation

4.2 Unattended installation

4.3 Headless installation

4.4 Scheduled or automated installation

4.5 Clean installation

4.6 Network installation

5 Installer

5.1 Bootstrapper

5.2 Common types

5.3 System installer

how to make an au and what are the rules

Answers

Answer:

alternate universe?

Explanation:

What is the operating system written to, and what does nonvolatile mean?

Answers

Answer:

Non-volatile memory (NVM) is a type of memory that retains stored data after the power is turned off. Unlike volatile memory, it does not require an electric charge to maintain the storage state. Only reading and writing data to non-volatile memory requires power.

alguien me prestta una cuenta de osu!, porfa

Answers

Answer:

english please........

Write a qbasic program to supply first , middle and last name of a person and print the output as given below :

If input is Sam Christopher Robert output should be Robert Christopher Sam.​

Answers

Answer:

The QBasic program is as follows:

10 INPUT "First name: " fName$

20 INPUT "Middle name: " mName$

30 INPUT "Last name: " lName$

40 PRINT lName$," ",mName$," ",fName$

50 END

Explanation:

This prompts the user and gets input for first name

10 INPUT "First name: " fName$

This prompts the user and gets input for middle name

20 INPUT "Middle name: " mName$

This prompts the user and gets input for last name

30 INPUT "Last name: " lName$

This prints the output in the required format

40 PRINT lName$," ",mName$," ",fName$

This ends the program

50 END

Two uses of mortise chisel

Answers

Answer:

Two uses of the mortise chisel are;

1) Mortise chisel are used for cutting across the grain of the wood directly   and also

2) To lever waste materials out of the cut area and smoothen the cut area

Explanation:

A mortice is a recessed hole created in a part that is meant to accommodate a complementary projection part, which will enable the fastening of the two parts together

A mortise chisel are chisels used for the chopping out mortise joints, and are designed such that the heavy impact of a mallet

Choose the term that matches each description.

_____________ allows users to interact with computer hardware and application software.

______________allows users to complete specific tasks, such as creating a document.

______________allows programmers to create new applications.

Answers

Answer:

operating systems, word software, computer concepts for end users

Explanation:

operating systems allow users to interact with computer hardware and application software.

word software allows users to complete specific tasks, such as creating a document.

computer concepts for end users allows programmers to create new applications.

The answer is "operating systems, word software, and end-user computer concepts", and its further explanation can be defined as follows:

The OS includes and administers all applications and software which a computer or mobile device could indeed execute, meaning the governance of the device software or hardware.The software for word processing is used for manipulating texts like a resume or report these text documents. Usually, you type in text and the software offers copy, delete, and numerous page layout devices.Study tools and coding areas allow finished to tailor apps to their needs and understanding instead of expert developers.

Thus, the answer is "operating systems, word software, and end-user computer concepts".

Learn more:

brainly.com/question/17798901

(101101+10110) /110
101101-11001/101 please I need help

Answers

Answer:

000000000000000000000000000001111111111111111111

Define the terms data and information ??​

Answers

Answer:

Data is an individual unit that contains raw materials which do not carry any specific meaning. Information is a group of data that collectively carries a logical meaning. Data doesn't depend on information. Information depends on data. It is measured in bits and bytes.

Data refers to raw unprocessed facts while information refers to data or raw facts that have undergone processing.

PLEASE READ ( if you want ) Before i used to have over 30 brainliest and i was just trying to earn points so i could get to ace, and people went through my profile and reported a ton of the things i answered so all of them got deleted. Now i only have 8 brainliest and i need 15. What am i supposed to do? It's causing me to lose points and brainliest. Ive lost 22 BRAINLIEST. its so annoying D: what do i do

Answers

Answer:

Rip! Do you have any idea why they're doing it? Are there things wrong with your answers or are people purposefully targeting you? And if so have you tried reaching out to staff?

Here is a super challenge for you if you feel up for it. (You will need to work this out in Excel.) In 2017 the Islamic month of fasting, Ramadan, began on Friday, 26 May. What fraction of the year was this? (to 1 decimal place) Hint: Think carefully which start and end dates to use.

Answers

The date Friday 26, May 2017 represents 2/5 of the year 2017

From the question, we understand that Ramadan starts on Friday 26, May 2017.

Using Microsoft Office Excel, this date is the 146th day of the year in 2017.

Also, 2017 has 365 days.

This is so because 2017 is not a leap year.

So, the fraction of the year is:

[tex]\frac{146}{365}[/tex]

Multiply the fraction by 73/73

[tex]\frac{146}{365} = \frac{146}{365} \times \frac{73}{73}[/tex]

Simplify

[tex]\frac{146}{365} = \frac{2}{5}[/tex]

Hence, the fraction of the year is 2/5

Read more about fractions and proportions at:

https://brainly.com/question/21602143

The fraction of the year that corresponds to the Islamic month of fasting, Ramadan, beginning on May 26, 2017, is 2/5.

Find out how many days passed from January 1, 2017, to May 26, 2017.

January has 31 daysFebruary has 28 daysMarch has 31 daysApril has 30 daysMay has 26 days

Total days = 31 + 28 + 31 + 30 + 26

Total days = 146 days.

The total days in regular year:

The total days = 31 + 28 + 31 + 30 + 31 + 30 + 31 + 31 + 30 + 31 + 30 + 31

The total days  = 365 days.

The required fraction is calculated as:

Fraction = 146 days / 365 days

Fraction = 2 / 5

So, the fraction is 2 / 5.

Learn more about Fraction here:

https://brainly.com/question/10708469

#SPJ3

PLEASE I NEED HELP FAST

Answers

Answer:

your answer will be src=

This type of mutation occurs when one or more base pairs are added to the gene sequence.

Answers

genetic mutation or engineering

explanation
i think i got it right
two sequences of base pairs

Harry makes pizzas to sell in his café. He buys packets of grated cheese and boxes of mushrooms and then uses them for the pizza toppings. For example, a bag of grated cheese is divided into 4 portions and used to top 4 pizzas. What formula is in cell D3?​

Answers

Answer:

=B3 / 4

Explanation:

The price of a packet of grated cheese is $2.60. To make pizza, this packet of cheese is divided into four to make 1 pizza. Therefore, the price of the grated cheese used to make 1 pizza = price of packet of cheese / 4 = $2.60 / 4 = $0.65

This price is the price inserted in cell D3. The price for each packet of grated cheese is inserted in cell B3.

Therefore the formula used in cell D3 to find the price of each grated cheese required for one pizza is:

Formula for D3 is "=B3 / 4"

Write a loop that displays your name 10 times. 2. Write a loop that displays all the odd numbers from 1 through 49. 3. Write a loop that displays every fifth number from 0 through 100. 4. Write a code sample that uses a loop to write the numbers from 1 through 10 to a file. 5. Assume that a file named People.txt contains a list of names. Write a code sample that uses a while loop to

Answers

Answer:

The program in Python is as follows:

#1

for i in range(10):

   print("MrRoyal",end=" ")

print()    

#2

for i in range(1,50,2):

   print(i,end=" ")

print()

#3

for i in range(0,101,5):

   print(i,end=" ")

print()

#4

i = 1

while i <=10:

   print(i,end =" ")

   i+=1

#5

myfile = open("People.txt", "r")

eachLine = myfile.readline()

while eachLine:

   print(eachLine)

   eachLine = myfile.readline()

myfile.close()

Explanation:

The program in Python is as follows:

Program #1

This iterates from 1 to 10

for i in range(10):

This prints the name for each iteration [modify to your name]

   print("MrRoyal",end=" ")

This prints a new line

print()    

Program #2

This iterates from 1 to 49 with an increment of 2

for i in range(1,50,2):

This prints the odd numbers in the above range

   print(i,end=" ")

This prints a new line

print()

Program #3

This iterates from 0 to 100 with a step of 5

for i in range(0,101,5):

This prints every 5th number

   print(i,end=" ")

Print a new line

print()

Program #4

This initializes the number to 1

i = 1

This opens the file in an append mode

f = open("myfile.txt", "a")

This loop is repeated from 1 to 10

while i <=10:

This writes each number to the file

   f.write(str(i))

Increment the number by 1

   i+=1

Close the file

f.close()

Program #5

This opens the file in a read mode

myfile = open("People.txt", "r")

This reads each line

eachLine = myfile.readline()

This loop is repeated for every line

while eachLine:

Print the content on the line

   print(eachLine)

Read another line

   eachLine = myfile.readline()

Close the file

myfile.close()

E) ¿Entiende usted que tendría repercusión legal un mal manejo de los datos del cliente por parte de la empresa? ¿Por qué?

Answers

Answer:

Efectivamente, un mal manejo de los datos del cliente por parte de la empresa tendría repercusiones legales que afectarían negativamente a la compañía. Esto es así porque un eventual mal manejo de los datos personales de los clientes implicaría una filtración de dichos datos hacia el resto del público, con lo cual los datos personales y privados de cada cliente se verían expuestos en forma pública, generando así posibles daños a estos a través de la mala utilización de dicha información por parte de terceros malintencionados.

Steeler corporation is planning to sell 100,000 units for 2.00 per unit and will break even at this level of sales fixed expenses will be 75,000 what are the company's variable expenses per unit

Answers

Answer:

1.25 per unit

Explanation:

Number of units to sell = 100,000

Price per unit = 2

Fixed expense = 75000

At break even point :

Revenue = total expenses

Total expenses = fixed cost + variable cost

Let variable cost = x

Revenue = units to sell * price per unit

Revenue = 100,000 * 2 = 200,000

Hence,

Fixed cost + variable cost = Revenue

75000 + x = 200,000

x = 200, 000 - 75000

x = 125,000

Variable cost = 125,000

The variable expense per unit is thus :

Variable expense / number of units

125,000 / 100,000 = 1.25 per unit

1
Which is not an effective way to search for a file that is located in an unknown folder
location?
(A) entering the name of the file in the space for Search Programs and Files in
Windows
(B) pressing Windows key and entering the file name into the search box
(C) selecting Control Panel, then
selecting Indexing Options in Windows
(D) pressing Windows Key and [F] to open the universal search menu and set it to
search files

Answers

Answer:

(C) selecting Control Panel, then selecting Indexing Options in Windows

Identify an advantage of the software as a service (SaaS) approach in public cloud computing. Group of answer choices The user handles software maintenance and upgrading features. The user controls software deployment and configuration settings. The user can create an application using tools and libraries from the provider. The user does not need to purchase and install additional hardware to provide increased capacity.

Answers

Answer:

The user does not need to purchase and install additional hardware to provide increased capacity.

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

Software as a Service (SaaS) can be defined as a cloud computing delivery model which involves the process of making licensed softwares available over the internet for end users on a subscription basis through a third-party or by centrally hosting it. Some examples of SaaS are Go-ogle apps, Bigcommerce, Salesforce, Slack, Dropbox, DocuSign, Microsoft Office 365, etc.

An advantage of the software as a service (SaaS) approach in public cloud computing is that the user do not have to purchase and install additional hardware to provide increased capacity because the software provider makes all of the necessary features for smooth operations and proper functioning available to the user.

Review the HTML tags that we have gone over in this lesson. Research HTML tags on the web and identify two new tags. Use these tags along with the ones you have learned in the lesson and construct a simple web page in HTML.

Some suggestions of simple tags include those which:

create a simple line break;

another way to create bold text;

underline text;

make text within the tag bigger than the rest of the text (specifying the size of the text);

mark or highlight a word or parts of your text;

a short quotation;

subscript text;

and superscript text.


You will only submit your document with the html you have created. However, it is always a good idea to use an HTML test bed to check your work.


Tags we have gone over in this lesson will be in the picture

Answers

<html>

<body>

<h1>Hello, Welcome to this simple website</h1>

<br>

<u>This is a very good <strong>quote<strong></u>

<br>

<blockquote>"Sometimes silence is the best answer"</blockquote>

<br>

<p>This is our 16<sup>th</sup> anniversary<p><br>

<p>H<sub>2</sub>So<sub>4</sub>is highly reactive</p>

</html>

<body>

¿Cómo sobrevivirían las personas, sin gas, agua, luz, teléfono, ni internet?

Answers

Eles nao tinham Condiçoes de vida e sem a agua nao consiguem Sobreviver porque agua é tudo e a agua é metade da nossa vida

If a web address is written as http://www.mywebprescence.com/index.html: What part of this address is considered to be the webpage?

Answers

(http://www.) is considered

write an algorithm to find perimeter of circle

Answers

Answer:

Here’s one!

Given [math]R[/math], the radius of the circle.

Let [math]N,D\leftarrow 0[/math]

Repeat until [math]D[/math] is large enough (about 1,000,000)

[math]x,y\leftarrow U[0,1][/math]

If [math]x^2 + y^2\le 1[/math] then [math]N\leftarrow N+1[/math]

[math]D\leftarrow D+1[/math]

[math]P\leftarrow\frac{8NR}{D}[/math]

Return [math]P[/math]

[math]U[0,1][/math] is a uniform random number in the range [math][0,1][/math].

Explanation:

Other Questions
After Benjamin Franklin proposed the idea of France aiding the US, it took France's King Louis XVI only ____ ____ to agree. the southern colonies were able to build a plantation system because they: Select the correct answer.Sally is preparing to create a concept map for her assignment. Which idea would be best to place in the center of her map?OAonline learningOB.discussion with a wider audienceO C.flash cardsODactive involvement and engagement What are most likely the values of the quantum numbers I and mI for anelectron in a 3p orbital?A. I = 1, 2, 3; mI = -1/2, + 1/2B. I = 3; mI = -1/2, + 1/2C. I = 0, 1, 2, 3; mI = -1, 0, 1D. I = 1; mI = -1, 0, 1 Protective factors include all of the following except1self esteemperfectionismgeneticssocial supportphysical health PLS HELP MEClick the button below to reread the story "The Offering."The OfferingBy the time the wolf reaches her she has already eaten the other children. It studies her, blood stilldribbling from her chin, and believing her more beast than child, it slinks off to the next town. But thechildren are still in her, as she knew they would be, and after some reassurance that shes a safe vessel,they start to come out again.It begins in small ways. She enjoys foods she once didnt. She starts to take a new way homefrom school. Sometimes she visits their mothers, who make her pancakes and ask about her day.Occasionally they nudge her to clean the rooms of the eaten, still messy, untouched. Theyre grateful tohave a glimmer of their children. Others werent so lucky.In time the children become stronger. She no longer enjoys ballet; she plays soccer instead. She quitsthe debate team, preferring to stay home and play video games. She becomes allergic to her own dog,so her parents put it up for adoption. Soon she pals around with the older childrenthe siblings of theones she atewho were rendered safe by their extra few years on earth. They teach her how to smokecigarettes and steal things from peoples mailboxes.She tries to make them all happy but there are so many of them, so many voices, its hard to knowwhose feelings are whose. She wants to quiet them, but how can she? Shes the lucky one. The onewhos still here.A few months roll around and shes eating dinner at a different house each night, sleeping in a differentbed, playing a different sport. Her handwriting is never the same. She starts using words shed neverlearned before. Rude words. She is very, very tired. But they still want more.She leaves in the middle of the night so the parents cant stop her. It takes time for her to find anybody,the next town so irreparably gutted. They must have had more children here. But when she sees theother girl crying, tiny face framed by a red bow, she knows she has found the one. The other girl countsstones on the cold sidewalk, giving them each a name: Emma, Jordan, Taylor, Mackenzie, and talks tothem, asks them what they want to do.When she approaches, the other girl startles. I thought you were the wolf, the other girl whispers. Ipromise I tried to save them.She kneels beside the other girl, wipes the tears from her eyes. Eat me, she says. It will help.What makes this story's ending typical for a flash fiction story?It ends in a way that is completely expected.It carefully states the theme of the story.It leaves a lot to the reader's interpretation.It reflects on events in the story's first paragraph. security is an essential elements of a society explain WHAT PUNCTUATION MARKS IS USED TO INTRODUCE A SHORT, DIRECT QUOTATION IN FORM OF COMPLETE SENTANCE The following data were accumulated for use in reconciling the bank account of Creative Design Co. for August 20Y6: a. Cash balance according to the company's records at August 31, $19,140. b. Cash balance according to the bank statement at August 31, $19,950. c. Checks outstanding, $3,890. Deposit in transit not recorded by bank, $3,120. d. A check for $340 in payment of an account was erroneously recorded in the check register as $430. e. Bank debit memo for service charges, $50.Required:Journalize the entries that should be made by the company that (a) increase cash and (b) decrease cash. A right triangle has side lengths 8, 15, and 17 as shown below. Use these lengths to find tan, sind, and cos 4. (GIVING POINTS AND BRAINLEST TO BEST ANSWER) Read the excerpt from the Haida creation myth.But in Ravens travels, he saw that there was no one to take care of the earth. He landed on a beach and stopped to think about how to solve this problem. Nearby, he saw a huge clam shellit seemed to be making noise! Curiously, Raven approached and saw a group of tiny creatures in the shell.Read the excerpt from the Maori creation myth.Ts descendants became the Mori, the humans who are able to master anything that they decide to conquer: the forest, the sea, the food, and the earth. Only Tawhiri escapes Ts wrath, and still today the Mori battle against the hurricanes he sends from above.Based on these excerpts, how do the Haida and Maori cultures view the relationship between humans and the environment?The Haida believe they exist to serve nature, while the Maori believe they must live in harmony with their surroundings.The Haida believe they must overcome the elements of nature, while the Maori believe they must be kind to their surroundings.The Haida believe they created their surroundings, while the Maori believe they are more powerful than nature.The Haida believe they were picked to be responsible for the earth, while the Maori see themselves in conflict with nature. Which of the following would DECREASE the rate of a reaction?1. add a catalyst2. increase the concentration3. increase the volume4. increase the pressure The New Kingdom began under the rule of Ahmose. What did he accomplish that allowed for the emergence of the New Kingdom? What is the equation of the following line written in general form? (The y-intercept is 7.)y(-2.1) A person is pushing a box across a table. The measured forces on the box are 10N, 14N, -7N, -10N.Which force is represented by -7N?A) force of frictionB) normal forceC) force of gravityD) push force which two important events happened on 16 December? What is the perimeter of a polygon 8cm 6cm, 4cm, 6cm what two forces contribute to the nuclear tug of war in an atom If f(x) = x^2 and g(x)=x+ 6 find g(f(0)) The class is____boring that the student falls asleep. A.such B.much C.too D.so