Answer correct or d.i.e :D
BE WARNED
Write an algorithm using pseudocode that someone else can follow. Choose one of the following options:
1. Decide on the message you would like to display to the screen. Some ideas include:
1. Your favorite book title or TV show and why you like it
2. A few sentences sharing information about you
3. Your favorite sport and team or athlete
2. Use two variables to store your message.

Answers

Answer 1

Answer:

Insert your pseudocode here:

# Assignment  Python Variables worksheet

#10/30/2020

def main():

   TVshow = ("Darling in the Franxx")

   print(TVshow)

   WhyILikeIt = ("Action Romance fighting")

   print(WhyILikeIt)

main()

Output

My favorite TV show is Darling in the FRANXX.

I like it because there's a lot of action and fighting.  

Review Question

Response

What was the purpose of your program?

The purpose of my program was to say "I like coding" to my teacher. It also gave me a chance to practice my Python skills.

How could your program be useful in the real world?

I'm going to show it to my teacher so she knows I like the class.

What is a problem you ran into, and how did you fix it?

I kept typing “Darling In the FRANXX" without the quotation marks, and it wouldn’t work. When I realized my error, I fixed it and it worked.

Describe one thing you would do differently the next time you write a program.

I learned that it is important to pace myself and pay attention to details. When I found the error, I learned what happens when I don’t use the quotation marks. Now I know I need to pay attention to my code, so I don't leave out important information.

Answer 2
Alr bye world :)))))))

Related Questions

will I be able to play among us?

Answers

Answer:

yea

Explanation:

Answer:

no clue but this gives me 10 points.

Explanation:

Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?

A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.

Answers

Answer:

C. Configure a safe sender

Explanation:

It’s dabest thing to do

As per the given scenario, Walt should need to configure a safe sender. The correct option is C.

What is configuration?

A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.

Configuration frequently involves picking the right hardware, software, firmware, and documentation.

A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.

The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.

Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.

Thus the correct option is C.

For more details regarding configuration, visit:

https://brainly.com/question/13410673

#SPJ2

Choose all statements that identify the benefits of programming design.

It allows programmers to be more creative in writing the code.

It provides a design approach to a specific type of problem.

It ensures that all code will work together.

It results in fewer lines of code.

i hope this helps ( B and C)

Answers

b and c

Explanation:

b and c.........................

It’s b and c I took the test

and there you go
sorry its saying my thing is tooo small

Answers

Answer:

Global knowledge

Explanation:

It has been proved by scientists that the earth is round

Hope this helps!

Global knowledge it was easy :)

How do I find/search for someone???

I've been looking forever. Please help!!!

Answers

Answer:

if you have seen their profile before and know their name, search their name in your history, or if you know someone who is friended them and your friends with them, then look at your friends, friends list and they should be there, or if they have commented and or answered somewhere you have been, you can search there.

Explanation:

The person above me is right

Which action does not happen in each iteration of the repeat loop in the
code?

O A. The shark position is set to the top left of the screen.
O B. The number of sharks decreases.
O C. The program pauses for 2 seconds.
D. The shark follows the fish at a speed of 20.

Answers

The action does not happen in each iteration of the repeat loop in the code is the number of sharks decreases.

What does iteration mean?

In terms of IT and computer programming, the word iterative is known to be a term that connote the act where the set up of a product or application is said to be improved through the use of repeated review and also that of testing.

Note that based on the program above, the  action does not happen in each iteration of the repeat loop in the code is the number of sharks decreases as it does not concern it.

Learn more about iteration from

https://brainly.com/question/25754804

#SPJ2

B the number decreases

Try to guess my favorite music genre and i will give you a brainliest.

Answers

Answer:

Rock n' roll. This I know for sure.

Which are ways cybercriminals act? Select 3 options.


log keystrokes of other users
destroy information
sell usernames and passwords
share open-source software
correct social injustice

Answers

Answer:

Destroy information, log keystrokes of other users and sharing open-source software

Explanation:

Log keystrokes of other users, destroy information, Sell usernames and passwords are the three ways in which cybercriminals act.

What are cybercriminals?

Cybercriminals are individuals or groups who use technology and the internet to commit crimes, including theft, fraud, identity theft, and other malicious activities.

Cybercriminals operate in three ways:

Logging other users' keystrokes: This is a type of cyber attack in which the attacker uses software or hardware to record every keystroke a user makes on their computer or mobile device.Attempt to destroy or alter data stored on a computer or network: Cybercriminals may attempt to destroy or alter data stored on a computer or network in order to cover their tracks or to cause harm to the organisation.Selling usernames and passwords is a common way for cybercriminals to make money.

Thus, share open-source software and correct social injustice are not ways in which cybercriminals act.

For more details regarding cybercriminals, visit:

https://brainly.com/question/31148264

#SPJ3

Help me Please Due today

Answers

Answer:

1. Syntax search looks for matching documents that contain one or more specific words

2. quotation marks can be used to make a keyword search more specific when looking for a specific phrase

3. Boolean operators can be used to broaden (OR) or narrow (AND) a search

Answer:

1. A keyword search looks for matching documents that contain one or more specified words.

2. Quotation marks can be used to make a keyword search more specific when looking for a specific phrase.

3. Boolean operators can be used to broaden (OR) or narrow (AND) a search.

Explanation:

A type of search that looks for matching documents that contain one or more words specified by the user.

If you put quotation marks around a word or phrase, the search results will only contain results that match exactly the word or phrase in the quotes.

Boolean operators can broaden (expand) and narrow (restrict) searches to increase the number of relevant search results we retrieve.

Other Questions
I need some help with this one please and thanks. Because facial expressions can't be controlled, people can't hide their true feelings. Group of answer choices True False Ways that teachers can overcome a lack of resources in their classes Malik borrowed $8,000 to buy a new boat. He will pay off the loan after 4 years by paying back the principal plus 6.5% simple interest. How much will Malik pay back altogether?pls help $520 $2,080 $8,000 $10,080 Alexander owns a small business selling used books. He knows that in the last week 70 customers paid cash, 3 customers used a debit card, and 39 customers used a credit card.If next week, he is expecting 500 customers, about how many would you expect to pay with a debit card? Round your answer to the nearest whole number. Provide two numbers that are on the opposite side of zero. What is 316+178*2427(2639+26383)-373637/282637 Which inequality describes the graph Y < 3/4x -3Y _> 3/4x -3Y _< 3/4x -3Y > 3/4x -3 What does the symbol on a calculator do?Thanks :) Let P(t) represent the amount of a certain drug, in milligrams, that is in the bloodstream at time t hours. The rate at which the drug leaves the bloodstream is proportional to the amount of the drug in the bloodstream. The amount of the drug in the bloodstream can be modeled by dP/dt = kP, where k is a constant and t is time, in hours. At time t = 0,500 milligrams of the drug was administered. At the moment when the amount of the drug in the bloodstream is 50 milligrams, the amount is decreasing at a rate of 11.5 milligrams per hour. Which of the following is an expression for P (t)? A. P(t) = 500 0.23t.B. P(t) = 500 0,23 42.C. P(t) = 500e -0.231.D. P(t) = e-0.23+ + 499. what was one effect of the Burlington treaty? history help urgently do 1 exercise guys i NEED HELP NOW! ansewr this ( 2 1/4) x (-8) Please help! Problem is below! What is the length of CD to the nearest tenth of a centimeter? All angles are right angles and right triangles are formed. What is the conflict of the book stepsisters by Jennifer Donnelly What was the NEGATIVE effect of the oil embargo?A: The price of fuel increasedB: Americans started using more renewablesC: Americans began using energy less efficiently the adjacent side of a parrallelogram are 12 and 7cm.if the angle between them is 150 degrees.find the area of the parallelogram The 3 branches of government's main duties are? What type of polygon makes up the base of the polyhedron? What is one reasons steinbeck uses paralleism in the grapes of wraith ?