Review the items below to make sure that your Python project file is complete. Once you have finished reviewing your variables.py assignment, upload it to your instructor.1. Make sure your variables.py program prints the following things, in this order:a) Hello world!b) Spamc) Eggsd) SpamEggse) Spam Eggsf) Spam Eggsg) 7 9h) 20i) 13j) 5k) 13l) 10.8m) 2.72. Make sure that you have saved your program. TIP: If there is an asterisk before the file name in the variables.py text editor window, you need to save your work.

Answers

Answer 1

Answer:

print('Hello world!')

print('Spam')

print('Eggs')

print('SpamEggs')

print('SpamEggs')

print('Spam Eggs')

print(7)

print(20)

print(13)

print('5k')

print(13)

print('10.8m')

print(2.72)

Explanation:

Integers and floats don't need quotes, but if you want to combine it with a string, then you need a quote. Hope that this solution is what you are looking for!


Related Questions

which type of broadband internet offers connections nearing the speed of light?

Answers

Answer:

FiberOptic connections

Explanation

One of the fastest data transfer methods for computers.

The type of broadband internet that offers connections near the speed of light is fiber-optic. The correct option is c.

What is fiber-optic?

Information can be sent from one location to another via optical fiber. Communications over the internet, cable television broadcasts, and telephone calls all use it.

Data transmission through the internet is one typical application. Most likely, a fiber optic cable connecting my computer and Brainly's servers to your browser allowed it to obtain this webpage.

Fiber optics is used in communications, medicine, optical inspection, lighting, and in the making of sensors. The Internet is a connection of computers from different places without wires. It is transferring information.

Therefore, the correct option is c. fiber-optic.

To learn more about fiber-optic, refer to the link:

https://brainly.com/question/10062531

#SPJ2

The question is incomplete. Your most probably complete question is given below:

Cable.

DSL.

fiber-optic.

satellite.

Which of the following behaviors does not harm a company if your employment is terminated?

getting a copy of word-processing software before leaving

selling trade secrets to competing companies or to your future employer

creating a username and password so you can access company information after you have left

notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave

Answers

Answer:

Notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave.

Explanation:

Trying to grab a copy of your work software can harm the company by potentially creating a security risk. There can still be residual files left by the company left in the software, and any virus or hackers that access your computer can find those files or connect to the company's cloud network.

Selling trade secrets will not only be bad for the company once your employment is terminated, but can actually lead to job termination itself because with those secrets out, competing companies can make identical products of the same (or better) quality for less money, which could result in a loss of profits or even going out of business. This is why non-disclosure agreements exist.

If you can still access company information even after you leave, this poses a security threat to the company because you can then sell that information to other companies or leak it online for everyone to see. Even if you don't do it yourself, a virus or hacker lurking on your computer would be more than happy to do it for you. That information could also be personal payment or identifying information of employees and clients/customers, which could cause people to lose trust in the company.

The best thing to do to avoid facing these consequences and protect other people's information is to turn over your accounts and any information you have of the company and allow them to revoke your access to that information. This not only helps the company remain secure and profitable, but you also won't have to possibly deal with law enforcement and have fewer job opportunities as a result.

Answer:

D. Notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave.

Explanation:

Why do we collect feedback on the code we write?

Answers

Answer:

to improve our code

Explanation:

"To improve our code" we collect feedback on the code we write.

Collecting feedback helps the users to learn whatever your consumers think approximately company reputation, performance, as well as merchandise or their items.Going beneath their basic likes as well as their dislikes and assisting you in understanding and evaluating wherever you may grow and where the business position in comparison to your competition.

Thus the above answer i.e., "option a" is correct.

Learn more about feedback here:

https://brainly.com/question/1603365

did someone hang themself on the set of wizard of oz

Answers

No - it was a rumour that started when the film was having its 50th anniversary in 1989

The light in a room must be turned on when there is one or more person in the room and turned off the rest of the time. A sensor is used to detect if there is someone in the room. Describe the use of a microprocessor to control the light in the room.

Answers

Answer:

ZOO WEE MAMA

Explanation:

ZOO WEE MAMA 23

aaron has started a food blog on which he wants to post his recipes. he wants to place a high-quality image next to each cooking step. which file format should he use so that users do not experience a lag when loading the high-quality images on the website?

Answers

The picture format which should be embraced on Aaron's blog in other to ensure that customers have smooth viewing experience while also preserving the quality of uploaded images is the JPEG format.

File format refers to the manner in which files are encoded. Picture files have several encoding types such as JPEG, JPG, GIF, PNG and so on.

Since, Aaron is considering images which loads quickly without lagging, then he'll need to compress the size of the uploaded images so that they have smaller file sizes.

In other to preserve image quality while working down the size of the image, the JPEG image format, produced good quality images with smaller file sizes compared to other file formats.

Therefore, the file format which should be adopted by Aaron ls the JPEG picture format.

Learn more :https://brainly.com/question/24941137

1 of 10
The biggest difference between scholarships and loans is that
scholarships are considered _____ but loans must be paid back.
easy money
liquid assets
free money
sound investments

Answers

Answer:

free money

Explanation:

scholarship money you can keep and do what you please with it. its not really easy money since its actually difficult to get scholarships, and the other ones dont make sense because how do you invest in a scholarship? theyre not liquid assets either

What is LinkedIn?

A job search website
A virtual job fair
A recruiter website

Answers

Answer:

A job search website.

Explanation:

most file managers include a way to create a folder through the save dialog box. true or false?

Answers

Answer:

false because most of the file managers just keep Everything organized by dates, years, and everything like that

Explanation:

did someone really hang themselves on wizard of oz

Answers

i think so the cast is def scary

Describe the type of gameplay seen during early video games

Answers

Answer:

2d?

Explanation:

It could be 2D because most games such as early Mario and Donkey Kong games were 2D games.

Answer: Arcade Machines

The earliest gameplay video games were arcade machines such as Mario, Donkey Kong, and PacMan. Most early video games being produced by Nintendo.

cookies that remain on your device indefinitely are called

Answers

Answer:

Persistent Cookies: Persistent cookies stay on the user's browsing device until the user clears them or until they reach their expiration. Persistent cookies are those that retain information on the user's specific preferences so that we can provide a “personalized” user experience.

Explanation:

I hope that this helps, if you have anymore questions, please, feel free to ask. I hope that you have an amazing rest of your day. ;D

Cookies that remain on your device indefinitely are called persistent cookies.

What are persistence cookies?

Cookies that remain on your device indefinitely are called persistent cookies.

These cookies are stored on the user's device even after the browser is closed, and can be used to track the user's activity over time.

We have,

Persistent cookies:

It can be useful for storing information such as login credentials or user preferences, as they allow the user to remain logged in or have their preferences saved between browsing sessions.

However, they can also be used for tracking and advertising purposes, which has raised concerns about online privacy and security.

Many web browsers offer options for managing cookies, including the ability to delete or block persistent cookies.

Users can also use browser extensions or privacy tools to control how cookies are used on their devices.

Thus,

Cookies that remain on your device indefinitely are called persistent cookies.

Learn more about persistent cookies here:

https://brainly.com/question/29608733

#SPJ5

2) State True or False. 1. Abacus is an electronic device. 2. ROM is read and writes memory of computer. 3. Header and footer appear at the top and bottom of 4. The first microprocessor is INTEL 4004. 5. CTRL + A is used to print data in M.S. word. Answer the following questions:​

Answers

Answer:

1 false

2 false

3 false

4  true

5 false

Explanation:

Answer:

False, True, True, True, False

Explanation:

1. False, it is a calculation device not electronic device.

2. True

3. True, Header appear at the top and Footer appear at the bottom.

4. True

5. False, Ctrl + A in MS Word or other text platforms is used to select all the text, not to print data in MS Word. To print data in MS Word or other text platforms we use Ctrl + P.

Which device do you think is the most important in the development of human civilization

Answers

Answer: The most important characteristic for the development of a civilization is the presence of advanced cities because they were centers of trade, which established economies and allowed for further development of the civilizations.

Explanation:

Your welcome :)

what is the name of the method of problem solving that breaks a problem imto smaller problems​

Answers

Answer:

The first thing that came to mind was when my parents tell me "Take it one step at a time" I hope this helps

Explanation:

the most important keyboard instrument of the romantic period was the

Answers

Answer:

piano

Explanation:

________ is the use of information technology to support the sharing of content among networks of users.

Answers

Answer:

The social media is the use of IT to support the sharing of content among network of users.

one Q what will be the answer?

Answers

Answer: a computer system that has one function within a large system

Explanation:

the key word here is EMBEDDED which means WITHIN SOMETHING ELSE

why does messenger keep saying waiting for network

Answers

you prob need to fix your data or redownload it again

why do cyber attackers commonly use social engineering attacks?

Answers

Answer:

Sometimes the computer's brain is too secure, so of that's the case you should just try to hack the human brain by tricking it to give you the password to an account, or whatever you are using it for.

Hope this help please give the brainliest award.

Answer:

Attackers can gain what they want while bypassing most technical security controls

Explanation:

.

lauren wants to write short articles and post them online. if she has an internet connection, what software can help her do her work?

Answers

Lauren could accomplish her aim if she has an internet connection by making use of Zoho writer.

Zoho writer provides Lauren with a platform to write and post her documents as long as she has internet connection because zoho writer is cloud based.

The fact that Zoho writer ls cloud based, it means that only internet connection is required as the platform is equipped with a word processing tools and a clean user interface, which provides all the tools required to write a good document.

Therefore, zoho writer software could be adopted by Lauren once she has internet connection.

Learn more :https://brainly.com/question/24978746

did someone hang themselves on set of wizard of oz

Answers

No - its a rumour that has been going around since the films 50th anniversary in 1989.

An HTML sitemap provides a list of internal links on a website accessible to users

Answers

The answer is true edg 2025 The distinction between XML and HTML sitemaps is that XML sitemaps are written for search engines, whereas HTML sitemaps are written for humans. An XML sitemap is designed especially for search engine spiders. An HTML sitemap helps lost human users locate the page they’re searching for on your website. SEO Site Checkup’s sitemap tool is a fast and simple one to try – simply enter your URL and let them see if they can locate your sitemap. Second, you could try crawling your website with Spotibo by creating a free account. Then, to see if you have a sitemap, you’d have to search at just the XML file forms

What types of games became popular in the 90s? List three games and how they had evolved from their successful 80s video game rivals.

Answers

Answer:

Doom (1993) Half Life (1998) Super Mario 64 (1997)

Explanation:

Doom and Half-Life were PC games.

Doom was an early 90s PC shooter that was "3d" it wasn't actually 3d but it used a unique rendering system to make it look 3d. It was a level to level shooter that also included secrets

Half-Life was a Actual 3D game and required quite a beefy Graphics card in your computer at the time to run it smoothly, It was a long story-driven game

Super Mario 64 was one of the first "True 3D" games on Home console because it was a launch title for the brand new N64 It utilized the hardware for a brand new experience for console players.

Most 80s games were even more primitive and were either Hosted in arcade cabinets at your local Arcade Such as Outrun (1986) (Btw great soundtrack!) or the NES that allowed you to play the Original few Mario games that were all 2D.

So one of the biggest Evolutions in 80s to 90s gaming is the introduction of 3D titles being able to run on good computers in the early 90s and home consoles could also run 3D titles at the end of the 90s

Pls, mark Brainliest I put my heart and soul into this. Very fun Question!!!

After hacking into atm systems remotely using a laptop, What attacker worked with the atm manufacturers to resolve the identified security vulnerabilities

Answers

grey hat hackers are those after hacking into ATM systems remotely using a laptop, works with the ATM manufacturers to resolve the identified security vulnerabilities

A grey hat hacker is simply known as an hacker that falls between the range of black and white hacker. They are known to illegally break into systems so as to show off their skills to the administrator of the system they penetrated or to seek to sell their services in repairing security breaches.

In the ATM case, they attacked it and then also want the ATM manufacturer to use their service.

Conclusively we can therefore say that the hacker was a gray hat hacker.

Learn more from

https://brainly.com/question/15899195

excuse me i am going into my A levels and i need help in picking what further pure mathematic units i need to pick since i am studying ICT.

Answers

Answer:

i dont know bout math units but subjects for ict include

microcomputer technology, and systems resource management ,computer systems organization.

Explanation:

in classification problems, the primary source for accuracy estimation of the model is ________.

Answers

Answer:

In classification problems, the primary source for accuracy estimation is the confusion matrix (or classification matrix or contingency table)

HELP HELP HELP HELP HELP HELP PLEASE GUYS​

Answers

Answer:

word

Explanation:

Write a program whose input is a string which contains a character and a phrase, and whose output indicates the number of times the character appears in the phrase. Ex: If the input is: n Monday the output is: 1 Ex: If the input is: z Today is Monday the output is: 0 Ex: If the input is: n It's a sunny day the output is: 2

Answers

Answer:

import java.io.*;  

public class Main {

   public static void main(String[] args) throws IOException {

       BufferedReader in = new BufferedReader(new InputStreamReader(System.in));

       String s;

       while ((s = in.readLine()) != null) {

           int total = 0;

           for (char character : s.toCharArray()) {

               if (s.charAt(0) == character) {

                   total++;

               }

           }

           System.out.println(total - 1);

       }

   }

}

Explanation:

We start the program by using the BufferedReader which will allow input from the user.

Then, we create a variable String that will take the input from the user.

Since the problem is asking us for the total number of times that the specified character appeared in the String, we will have to iterate over that String and count every time the character is found.

For this, I initialized an integer variable total, that takes count every time the character is found.

Using a for each loop, I converted the string to a character array (e.g. instead of a String "Monday", it will now look like {"M", "o", "n", "d", "a", "y"). It will iterate for each character it finds and checks if the character at position 0 is the same as the character at position i.

If the condition is true, then the total will increment by one.

But the problem is, since we converted the string into a character array to validate each character, the initial character will also add to the sum. So for "n Monday", it will take the first n, and add the total + 1.

Without specifying total - 1, "n Monday" will output 2 since there are two total "n".

There is a limitation, which wasn't specified in the problem statement anyway, but it's good to be aware of in case you need to solve it. If you want to check all of the characters that must equal the character you want to validate, irrespective of upper or lowercase, you will have to convert the string to lowercase first, so that the program will take the uppercase letters into account as well.

For that, before the for each statement, simply add s = s.toLowerCase();

Hey is anyone else getting this? Don't mind the answer.

Answers

Answer:

Getting what? I don't get what you mean.

Maybe the dog is in heaven…therefore it’s infinity miles while the other has a certain number of miles because it is alive and on the earth..??


Not 100% sure but I think that’s why.
Other Questions
spindle fibers attach to kinetochores during _____. do you have any music recommendations???i need new music even though i have a 562 song track lol What led the masters of the school to take control of the situation?A. The students dare pranks were affecting the masters admiration for each other.B. The students dare pranks began to disrupt their friendships with classmates.C. The students dare pranks were putting the students safety at risk.D. The students dare pranks began to interfere with classroom performance. dare plague The first settlers arrived in the Americas between which of the following years?A.) 500 BCE and 500 CEB.) 100,000 and 65,000 BCEC.) 40,000 and 12,000 BCED.) 1200 and 500 BCE Choose the negative form of the following sentence: Il a toujours soif.O Il n'a soif jamais.Il n'a jamais soif.O Il a jamais soif.O Il n'a soif. Based on the data in the two tables, which statements are accurate? Check all that apply.A. Voters who were college graduates were more likely to support Clinton than Trump.B. Middle-income, White voters were more likely to support Clinton than Trump.C. College graduates earning over $100K were more likely to support Trump than Clinton.D. Non-college-graduates were just as likely to support Trump as they were Clinton.E. High-income voters making over $100K were divided in their support for Clinton and Trump. Answer pleaseeeeeeeee Write the slope-intercept equation of the line with slope -3/4 passing through the point (-4,5). If necessary, answer using fractions, not decimals. Answer: HELP!!!!!! I dont understand what to do. If you can please explain but just giving the answers would be fine. SOMEONE HELP ASAP!!! PLAeASE Anna and Ravi are members of different clubs. Anna's club charges $25 per month. Ravi's clubcharges $15 per month but has an annual fee of $40. After how many months will Anna andRavi have paid the same total amount?Pls helppp what is -3 increased by -9 what is the fifth amendment? how is a bulging disc different from a herniated disc? 40 points and brainliest to the best correct answer You have a bag containing 3 red, 7 green, and 6 blue pens. you choose 2 pens at random. find the probability of picking a red and blue pen with replacing. how did the role of haciendas change with independence from spain which continent has the largest number of people living in poverty in the world? How many ethnic groups are there in China? how does mephastophilis create conflict for faustus