Isla has just written a for loop that is supposed to print the numbers 1 through 10. When she runs it, the numbers 0 through 9 are printed. Which of the following is most likely her problem?

A.
She has forgotten to put a colon at the end of her loop statement.

B.
She has forgotten that Python begins counting at 0 instead of 1.

C.
She has not printed the correct variable.

D.
Only while loops can begin counting at 1 instead of 0.

Answers

Answer 1

Answer:

C. She has not printed the correct variable

Explanation:

When using ranges to count, you need to add +1 to the number you want to end on (she would have to write range(0, 11)). This is because the last number of the range isn't counted


Related Questions

T/F : the hard drives of devices to be disposed of should be destroyed before they are sold or recycled. _________________________

Answers

Answer: True

Explanation: If someone gets their hand's on the drive it can access personal data. Often this only happens in external hard drives however, it is better safe than sorry.

The hard drives of devices to be disposed of should be destroyed before they are sold or recycled. The reason behind this is that the hard drives contain sensitive information such as personal data, confidential business information, financial data, and more. If these hard drives end up in the wrong hands.


Simply deleting files or formatting the hard drive is not enough as the data can still be recovered using data recovery software. Therefore, the hard drives should be physically destroyed, making the data irretrievable. This can be done through methods such as degaussing, shredding, or melting. Many businesses and organizations have strict data protection policies that require the secure destruction of hard drives before disposal. Failure to follow these policies can result in data breaches, legal repercussions, and damage to the organization's reputation.

In conclusion, the hard drives of devices to be disposed of should be destroyed before they are sold or recycled to protect sensitive information from falling into the wrong hands. The explanation behind the need to destroy hard drives before disposal is to protect the sensitive information stored on them. Hard drives contain a vast amount of data that can include personal information, financial details, and confidential business data. If this information is accessed by unauthorized individuals, it can lead to identity theft, financial loss, and reputational damage. Deleting files or formatting the hard drive may give a false sense of security as the data can still be recovered using data recovery software. Physical destruction of the hard drive is the only way to ensure that the data is irretrievable. Methods such as degaussing, shredding, or melting are commonly used for this purpose. Businesses and organizations have data protection policies in place to ensure that sensitive data is securely disposed of before devices are sold or recycled. Failure to comply with these policies can result in legal and financial consequences, as well as damage to the organization's reputation. Overall, the need to destroy hard drives before disposal is essential for data protection and privacy. By following best practices and secure disposal methods, individuals and organizations can ensure that their sensitive information remains safe and secure.

To know more about devices visit :

https://brainly.com/question/11599959

#SPJ11

Which Annotation tool provides the ability to convert the mouse icon when giving a presentation to better focus the audience attention?

1. Arrow
2. Ink Color
3. Eraser
4. Laser Pointer

Answers

A laser pointer provides the ability to convert the mouse icon when giving a presentation:)

rohan is creating a presentation with at least 50 slides. he wants the slides to use a consistent layout and formatting. which of the following parts of the presentation should he design first? a. first slide b. title slide c. slide master d. last slide

Answers

Since Rohan is creating a presentation with at least 50 slides, the option that is parts of the presentation should he design first is option  c. slide master.

A title slide layout is what?

Page layout: Used to create more individualized documents, such as newsletters, books, or posters. A page layout document functions similarly to a canvas on which you can draw text boxes, images, and other objects, which you can then arrange however you like on the page.

Note that When you open a new PowerPoint presentation with a blank template, the Title Slide layout is used by default. The distinction between layout and formatting is that the former refers to the style of a document's format, whereas the latter is a structured arrangement of items within s nouns.

Learn more about presentation from

https://brainly.com/question/24653274
#SPJ1

How to fix an automated WordPress update has failed to complete?

Answers

First, clear your website cache and check if the update failed message still appears. If the error was a temporary one and WordPress has already taken care of it, then after cleaning the cache, the update failure message should disappear from the dashboard.

power steering belts should be checked for all of the following EXCEPT

Answers

You did not list the options.

differences between ancient means of communication and modern means of communication​

Answers

Answer:

The older methods of communication were cave paintings, smoke signals, symbols, carrier pigeons, and telegraph. The latest and modern ways are more convenient and efficient. For example, Television, Cell Phones, Internet, E-mails, Social media, and Text messaging

Answer:

The older methods of communication were cave paintings, smoke signals, symbols, carrier pigeons, and telegraph. The latest and modern ways are more convenient and efficient. For example, Television, Cell Phones, Internet, E-mails, Social media, and Text messaging.

The only real difference is the speed of it. Other than that, only the delivery methods have changed. Communication itself is the same, as far as I can see.

Explanation:

Which keys should you press to insert a comment in OpenOffice Writer?
A.
Ctrl+Alt+I
B.
Ctrl+Alt+C
C.
Ctrl+Alt+O
D.
Ctrl+Alt+N
E.
Ctrl+Alt+M

Answers

Answer: Ctrl + Alt + C

Explanation:

Using the flowchart below, what value when entered for Y will generate a mathematical error and prevent our flowchart from being completely executed? 3 0 1 None of these values will produce a mathematical error

Using the flowchart below, what value when entered for Y will generate a mathematical error and prevent

Answers

Answer:

The answer is the last choice that is "None of these values will produce a mathematical error".

Explanation:

In this question, the above given choice correct because neither of the flowchart procedures could trigger a mathematical error. This error could not be induced by multiplication, addition and subtraction, and the only division by 15. It is the only divide by 0, that's why the above flowchart will produce a mathematical error.

Using Python, solve this problem.

Using Python, solve this problem.

Answers

Below is a Python function that takes two arguments, food_cost and location, and returns the total cost of the order including tax based on the location:

python

def calculate_total_cost(food_cost, location):

   if location in ['Williamsburg', 'James City County', 'York County']:

       tax_rate = 0.07

   elif location in ['Charlotte County', 'Danville', 'Gloucester County', 'Halifax County', 'Henry County', 'Northampton County', 'Patrick County']:

       tax_rate = 0.063

   elif location in ['Central Virginia', 'Hampton Roads', 'Alexandria', 'Arlington', 'Fairfax City', 'Fairfax County', 'Falls Church', 'Loudoun', 'Manassas', 'Manassas Park', 'Prince William', 'Charles City', 'Chesterfield', 'Goochland', 'Hanover', 'Henrico', 'New Kent', 'Powhatan', 'Richmond City', 'Chesapeake', 'Franklin', 'Isle of Wight', 'Newport News', 'Norfolk', 'Poquoson', 'Portsmouth', 'Southampton', 'Suffolk', 'Virginia Beach']:

       tax_rate = 0.06

   else:

       tax_rate = 0.053

   total_cost = food_cost + (food_cost * tax_rate)

   return total_cost

What is the code about?

To calculate the total cost of an order, simply call the function with the food cost and the location as arguments. For example:

scss

# Williamsburg order with food cost $32.50

total_cost = calculate_total_cost(32.50, 'Williamsburg')

print(total_cost)

# Halifax order with food cost $28.90

total_cost = calculate_total_cost(28.90, 'Halifax')

print(total_cost)

# Arlington order with food cost $45.67

total_cost = calculate_total_cost(45.67, 'Arlington')

print(total_cost)

# Winchester order with food cost $10.88

total_cost = calculate_total_cost(10.88, 'Winchester')

print(total_cost)

Therefore, This will output the total cost of each order including tax.

Read more about Python here:

https://brainly.com/question/26497128

#SPJ1

See text below

Using Python, solve this problem.

You're working for Chick-fil-A to update their registers. You're writing code to calculate the total cost of customers' orders with tax.

Create a function that has two arguments:

cost of food tax based on location

The function should return the total cost of the order including tax.

Run/call the function for the following:

food costs $32.50 & was ordered in Williamsburg food costs #28.90 & was ordered in Halifaxfood costs $45.67 & was ordered in Arlington food costs $10.88 & was ordered in Winchester

General Sales Tax Rate

In these locations

7%

• James City CountyWilliamsburg• York County

6.3%

Charlotte County• Danville• Gloucester County• Halifax County• Henry CountyNorthampton County• Patrick County

6%

Central VirginiaCharles City, Chesterfield, Goochland, Hanover, Henrico, New Kent, Powhatan, and Richmond CityHampton RoadsChesapeake, Franklin, Hampton, Isle of Wight, Newport News, Norfolk, Poquoson, Portsmouth, Southampton, Suffolk, and Virginia BeachNorthern VirginiaAlexandria, Arlington, Fairfax City, Fairfax County, Falls Church, Loudoun Manassas, Manassas Park, and Prince William

5.3%

Page Everywhere else

state and explain two default icons on the computer desktop​

Answers

Answer:

Recycle Bin - Used to delete files. Deleted files can be restored or deleted permanently from the computer.

File Explorer - Used to access all sorts of files on the computer. Some are system made and others are added by the user, like video games or pictures.

Explanation:

Answer:

Recycle Bin - Used to delete files. Deleted files can be restored or deleted permanently from the computer.

File Explorer - Used to access all sorts of files on the computer. Some are system made and others are added by the user, like video games or pictur

Explanation:

To discover how many cells in a range contain values that meet a single criterion, use the ___ function

Answers

Answer:

COUNTIF

Explanation:

the Countif function counts the number of cells in range that meets a given criteria.

A bicycle moves forward 4.0 m when the pedals are rotated through a distance of 1.0 m. What is the IMA (Ideal mechanical advantage) of this bicycle?

Answers

Answer:

IMA =  0.25

Explanation:

Given the following data;

Input distance = 1m

Output distance = 4m

To find the ideal mechanical advantage;

Mathematically, IMA is given by the formula;

\( IMA = \frac {distance \; over \; which \; the \; effort \; is \; applied}{distance \; the \; load \; travels} \)

NB: The ideal mechanical advantage has no units.

Substituting into the equation, we have;

\( IMA = \frac {1}{4}\)

IMA = 0.25

Therefore, the ideal mechanical advantage (IMA) of this bicycle is 0.25.

Page orientation is determined in Microsoft Word from the __________ tab

Answers

Answer:

Page orientation is determined in Microsoft Word from the Page Layout tab.

Explanation:

The Page Layout Tab holds all the options that allow you to arrange your document pages just the way you want them. You can set margins, apply themes, control of page orientation and size, add sections and line breaks, display line numbers, and set paragraph indentation and lines.

cisco asa interface access rules are the most commonly used access control mechanisms on the security appliance. interface access rules permit or deny network applications to establish their sessions through the security appliance based on different information. on which three of these options is the access rules filtering based?

Answers

This is Cisco's solution, the Cisco IronPortTM S670 Web Security Appliance (WSA), which combines reputation filtering, inline file scanning, and signature-based malware detection.

Access control lists (ACLs), which restrict access in your network by blocking specific traffic from entering or leaving, are a feature of Cisco ASAs that offer basic traffic filtering capabilities. A STATIC NAT and an ACL authorizing the traffic are typically required to permit traffic from a lower-security interface to a higher-security interface. You can therefore reach any host on the inside if it has a static translation for that host and an ACL that permits the traffic.

Learn more about security here-

https://brainly.com/question/5042768

#SPJ4

You have the following code:
----------------------------------------------------------------------------------------------
fruit_list = ["strawberries", "bananas", "apples", "grapes"]
total_cost = 0
for fruit in fruit_list:
if fruit in ["apples","bananas"]:
total_cost += 3
elif fruit == "cantaloupe":
total_cost += 5
elif fruit in ["raspberries","strawberries","grapes"]:
total_cost += 4
-------------------------------------------------------------------------------------------------

What will be the value of total_cost?

A.13
B.14
C.15
D.7

Answers

Answer:

7

Explanation:

We already have the functions that tells us how much to add. If you add all this, you will get 12. HOWEVER because cantaloupe is in the list, the computer does not count that. So if we add that again without 5(how much the cantaloupe costs), we get 7.

problem description and given info you must write each of the methods described below. each of these methods will work with bankaccount objects in some way. a bankaccount class is already provided for you. be sure to read and understand this basic bankaccount class. you can view the given file by clicking on the current file: drop-down and selecting from the list. you will notice that the given bankaccount class defines three attributes. the first attribute is a string variable named accountholdername, the second attribute is a string variable named accountnumber, and the third attribute is a double named accountbalance - so each bankaccount object will know the name of the account holder, the account number and its current balance. the bankaccount class also defines two operations. the first operation is a method named deposit, and the second operation is a method named withdraw - so each bankaccount will be able to deposit, and withdraw funds to and from its balance. it can be very helpful to write some code in the main method to test the methods you are writing. it can also be helpful to submit your code for auto-grading after completing each part, and to make sure that you pass the structure and logic tests for each part before moving on to the next part. part 01 - make checking account for this part you must write a public static method named makebankaccount. this method will take two arguments. the first argument will be a string and the second argument will also be a string. this method must instantiate a new bankaccount object, then store the first argument value in the bankaccount object's accountholdername attribute, and store the second argument value in the bankaccount object's accountnumber attribute. this method must also initialize the accountbalance variable of the bankaccount object to zero. finally, this method must must return the new bankaccount object. after you have finished writing this method, run your code to find and then fix any syntax errors. you may also wish to write some other code (in the main method) to call and test your method(s). when you are confident that your method is structurally and logically correct, then submit your code to the auto-grader for feedback. your code should pass structure test 1 and logic tests 1.1 and 1.2 before you continue. part 02 - display account info

Answers

This problem description outlines a programming task to create methods that interact with bank account objects in Java. The provided BankAccount class has three attributes:

What is the programming task outlined in the problem description?

This problem description outlines a programming task to create methods that interact with bank account objects in Java. The provided BankAccount class has three attributes:

accountholdername, accountnumber, and accountbalance, and two operations: deposit and withdraw.

In Part 1, the task is to write a public static method called makebankaccount that instantiates a new BankAccount object, stores the given account holder name and account number as attributes, initializes the account balance to zero, and returns the new object.

In Part 2, the task is to write a public static method called displayAccountInfo that takes a BankAccount object as an argument and prints out its account holder name, account number, and account balance.

The code should be tested and submitted to an auto-grader for feedback, passing structure and logic tests for each part before moving on to the next.

Learn more about programming task

brainly.com/question/30132463

#SPJ11

_____ relationships can be implemented by creating a new entity in 1:m relationships with the original entities.

Answers

Entity relationships can be implemented by creating a new entity in 1:m relationships with the original entities.

What is entity relationship model?

Entity-relationship modeling is a database modeling method, used to produce a type of conceptual schema or semantic data model of a system, often a relational database, and its requirements in a top-down fashion.

What is relationship in data model?

A relationship is a connection between two tables that contain data: one column in each table is the basis for the relationship.

To see why relationships are useful, imagine that you track data for customer orders in your business.

Learn more about entity relationships here:

https://brainly.com/question/17063244#SPJ4

true or false?
\( 24 / 7 \) Celeb Fitness is the hot spot gym in Hollywood for celebrities to work out. Because many celebrities are often there, it is also a large tourist attraction, attracting people from all ove

Answers

\( 24 / 7 \) Celeb Fitness is not the hot spot gym in Hollywood for celebrities to work out. While it may be popular among some celebrities, there are other gyms in Hollywood that are more well-known and frequented by celebrities.

One example is Gold's Gym, which has a long history of being a go-to gym for celebrities in Hollywood. Additionally, Equinox is another popular gym known for attracting celebrities due to its high-end amenities and services.

It is important to note that while \( 24 / 7 \) Celeb Fitness may have some celebrity clientele, it does not necessarily make it a large tourist attraction. There are other landmarks and attractions in Hollywood that are more famous and draw in tourists from all over the world, such as the Hollywood Walk of Fame or the TCL Chinese Theatre.
To know more about Hollywood visit:

https://brainly.com/question/32288337

#SPJ11

The FAT method ______________.

a. keeps information about the block where bit vector is stored.

b. employs space maps to manage information about free blocks.

c. does not store information about free blocks.

d. incorporates free-block accounting into the allocation data structure.

Answers

The FAT method incorporates free-block accounting into the allocation data structure.

The File Allocation Table (FAT) method is a file system designed to store file information in a designated entry format. The operating system makes use of it to manage files on hard drives and other computer devices.

It usually comprises an entry for each block. As such, it is indexed via the block number. This helps to locate files faster based on the address of the given number of the free blocks as opposed to using the traditional grouping method.

Learn more about the File Allocation Table (FAT) method here:

https://brainly.com/question/4671431

1. Word Module 2 SAM Textbook Project

2. Word Module 2 SAM Training

3. Word Module 2 SAM End of Module Project 1

4. Word Module 2 SAM End of Module Project 2

5. Word Module 2 SAM Project A

6. Word Module 2 SAM Project B

Answers

The raise To Power Module of the program's calling error can be found in the real and integer values of the argument variables.

String should be spelled Sting. The set Double Module instead of returning an integer, does such. Access to local variables declared in the Main module is restricted to that module only. The raise To Power Module of the program's calling argument variables' real and integer values can be used to pinpoint the issue. Although the arguments for the raise To Power Module (Real value and Integer power) have been defined. The integer power is represented as "1.5," and the real value is supplied as "2." A real number, on the other hand, is a number with a fractional part. thus, a number without a fraction is considered an integer. 1.5 is a real number, whereas 2 is an integer. The parameters' contents when invoking raise To Power.

Learn more about The raise To Power Module here:

https://brainly.com/question/14866595

#SPJ4

When we are learning to count in school, which method do we use?
A: 9 numeral system
B: 10- base decimal method
C: Binary Number System
D: Advanced Counting System

Answers

Answer:

option no. c

Explanation:

an application uses transmission control protocol (tcp) as it requires data to make it to the destination 100 intact. which three are functions of this protocol?

Answers

A network discourse between applications is established and maintained as per the Transmission Control Protocol (TCP) standard.

What purposes does the transmission control protocol, or TCP, undertake?

The usage of TCP permits for the secure exchange of data between the server and client. No matter how much data is transferred across the network, it safeguards its integrity. It is therefore used to transfer data from higher-level protocols that necessitate the arrival of all transmitted data.

What are the TCP/IP protocol's five levels?

The five-layer networking paradigm serves as the foundation for the TCP/IP framework. The physical, data link, network, transport, and user application are listed from bottom (the link) to top (the user application).

To know more about TCP protocol visit:

https://brainly.com/question/21344755

#SPJ4

def winners(scores): This function takes a single dictionary as its parameter. The dictionary maps candidates to their scores. It should return a list of the candidate(s) with the highest score. The return value should be sorted in ascending order using the sort method on lists. assert winners({"a": 1, "b": 2, "c": 3}) == ["c"]
assert winners({"a": 1, "b": 1, "c": 1}) == ["a", "b", "c"]

def plurality(votes):
Another way to elect a candidate using Ranked Choice Voting is called the "Plurality" method. It assigns one point for being ranked first by a voter. The candidate with the most points wins.
This function should take a list of rankings as its input parameter, and it should return a dictionary. The returned dictionary has candidates as keys, and for each key, the associated value is the total number of first-place rankings for that candidate.
assert plurality(votes1) == {"a": 2, "c": 1}
assert plurality(votes2) == {"a": 2, "b": 1}
assert plurality(votes3) == {"a": 1, "b": 1, "c": 1}

Answers

The "Plurality" method is a voting system in which the candidate who receives the most votes in an election is declared the winner. It is commonly used in single-winner elections, such as those for political offices.

The first function, "winners(scores)", takes a dictionary of candidates and their scores as input and returns a list of the candidate(s) with the highest score. To accomplish this, we can first determine the maximum score in the dictionary using the max() function, and then use a list comprehension to find all candidates that have that score. Finally, we can sort the list in ascending order using the sort() method and return it.

Here's an example implementation:

```
def winners(scores):
   max_score = max(scores.values())
   winners_list = [candidate for candidate, score in scores.items() if score == max_score]
   winners_list.sort()
   return winners_list
```

For the second function, "plurality(votes)", we are using the "Plurality" method of Ranked Choice Voting to determine the winner. This method assigns one point for being ranked first by a voter, and the candidate with the most points wins. To implement this function, we can loop through each voter's rankings and add one point to the candidate who is ranked first. We can use a dictionary to keep track of each candidate's total number of first-place rankings, and then return this dictionary.

Here's an example implementation:

```
def plurality(votes):
   rankings = {}
   for vote in votes:
       if vote[0] not in rankings:
           rankings[vote[0]] = 0
       rankings[vote[0]] += 1
   return rankings
```

In this implementation, "votes" is a list of lists, where each inner list represents a voter's rankings in order. For example, [["a", "b", "c"], ["b", "a", "c"], ["c", "b", "a"]] represents three voters who ranked candidates "a", "b", and "c" in different orders. The function returns a dictionary where the keys are the candidates and the values are the total number of first-place rankings for each candidate.

To know more about Plurality" visit:

https://brainly.com/question/2516666

#SPJ11

Which explanation best explains the importance of using encryption?

Answers

Encryption is important because it protects sensitive information from unauthorized access. Encryption makes it difficult for hackers to steal personal and financial data, which can be used for identity theft, fraud, and other cyber crimes.

Step by step Explanation:

1. Encryption is a method of converting information into a code that only authorized individuals can read. The code is created using an encryption algorithm, which is a complex mathematical formula.

2. The importance of using encryption lies in its ability to protect sensitive information from unauthorized access. This includes personal and financial data, such as credit card numbers, social security numbers, and passwords.

3. Hackers and cyber criminals are always looking for ways to steal this type of information. If they are successful, they can use it for identity theft, fraud, and other crimes. Encryption makes it more difficult for them to do so.

4. Encryption is particularly important when data is transmitted over the internet. This includes online banking, e-commerce transactions, and email communication. Without encryption, this information can be intercepted and read by anyone with access to the internet.

5. Encryption also helps to protect information stored on electronic devices, such as laptops and smartphones. If these devices are lost or stolen, encryption can prevent unauthorized access to the data they contain.

6. In summary, encryption is important because it protects sensitive information from unauthorized access. It is a vital tool in the fight against cybercrime and is essential for ensuring the security and privacy of personal and financial data.

Know more about the encryption click here:

https://brainly.com/question/29572224

#SPJ11

In the Phoenix Wright/Ace Attorney games, you follow the story of a lawyer in a land where the accused are guilty until proven innocent. You play by selecting from lists of responses to crazy fictional courtroom scenes, including playing the defense attorney for a killer whale accused of murder. What is the best description for this game series?

A.
virtual reality game
B.
simulation game
C.
platformer game
D.
visual novel

Answers

The best description for this game series would be option D.) “visual novel.”

A visual novel is an interactive story told through talking and the user’s choosing. In this problem, a visual novel is being described in the context of a player in the role of a lawyer.

Answer:

Explanation:

D. visual novel

What are the Key Process Areas for CNNi Level 2?

Answers

The Key Process Areas (KPAs) for CNNi Level 2 are as follows: 1. News-gathering 2. Storytelling 3. Delivery 4. Technical Production 5. Teamwork 6. Communication 7. Planning and Organization 8. Initiative 9. Professionalism 10. Personal Development

The Key Process Areas (KPAs) are general categories of abilities and accomplishments that all journalists at CNN International should have, regardless of their specialty or role. KPAs are intended to outline a range of abilities that a CNNi journalist should have at each level. The ten KPAs at Level 2, as previously noted, are News-gathering, Storytelling, Delivery, Technical Production, Teamwork, Communication, Planning and Organization, Initiative, Professionalism, and Personal Development.

KPAs, in general, are used to evaluate a journalist's professional growth and advancement potential. They represent a framework of anticipated behaviors and actions that journalists should demonstrate in order to advance to the next level.

Learn more about KPA's: https://brainly.com/question/9940533

#SPJ11

What data type or you use to represent true or false values?
Int
Boolean
Char
Float

Answers

The Boolean type is used to represent true or false values

Answer:

boolean

Explanation:

Define Software. enlist different types softwares!
\( \\ \\ \\ \\ \\ \)
Thank You! ​

Answers

Answer:

Software is a set of instructions, data or programs used to operate computers and execute specific tasks. It is the opposite of hardware, which describes the physical aspects of a computer. Software is a generic term used to refer to applications, scripts and programs that run on a device. It can be thought of as the variable part of a computer, while hardware is the invariable part.

The two main categories of software are application software and system software. An application is software that fulfills a specific need or performs tasks. System software is designed to run a computer's hardware and provides a platform for applications to run on top of.

Other types of software include programming software, which provides the programming tools software developers need; middleware, which sits between system software and applications; and driver software, which operates computer devices and peripherals.

Early software was written for specific computers and sold with the hardware it ran on. In the 1980s, software began to be sold on floppy disks, and later on CDs and DVDs. Today, most software is purchased and directly downloaded over the internet. Software can be found on vendor websites or application service provider websites.

Answer:

Software is a collection of instructions, data, or computer programs used to run computers and carry out particular activities. Software instructs a computer on how to run, to put it another way.

Types of Software's :-

Utilities FirmwareOperating systemsProgramming language translator

__________________________

Hope this helps!

please help me out with answering the questions

please help me out with answering the questions

Answers

10.

if "h" in letter:

   #do something

11.

if value >= 13.6:

   #do something

12.

if 5 < y < 11:

   #do something

13.

if num1 == num2:

   print("equal")

14.

num1 = int(input("Enter a number: "))

num2 = int(input("Enter a number: "))

if num1 > num2:

   print(num1)

else:

   print(num2)

15.

if number == 89 or number == 78:

   print("Your number is equal to 89 or 78")

I hope this helps! If you have any other questions, I'll do my best to answer them.

Jijijiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii

Answers

Answer:

add me as a friend:)

Answer:

heeeeeeeeeeeeeeeeeeeeeeeehhhhhhhhhhhhhhhheeeeeeeeeeeeeeeeeeeeeeee

have a good day :)

Explanation:

Other Questions
It is easy to distinguish which issues fall under each category of health, safety, and nutrition.true or false Calculate the gravitational potential energy is a bicycle of mass 20kg and its rider of mass 50kg cycle to the top of a hill 120 metres high. Martin has earned a total revenue of $100 from producing custom shoes. At his current level of product, his average total cost is $1. If Martin has sold 50 pairs of custom shoes, then what is his profit What is the solution to use the following equation 5(2x-6)+20=10 in economies where there are many women working outside the home, the increase in gdp due to hiring nannies and housekeepers may ________ improvements in the standard of living. base: 10 ft height: 6 ftWhat is the area of the triangle? If y = xy + x2 + 1, then when x=-1,dy/dx Which of these tactics does the most to reduce soil erosion? What is Barack Obama's name? (Barack Obama) Complete the description of a classroom with the correct forms of ser, estar, and haber (hay). Many neurons contain two neurotransmittersa situation generally referred to asA. coexistence.B. dual transmitters.C. metabotropic.D. tripartite. What is the slope of the line that passes through the points (-2,-3), and (5, 4)?0-10301-3NOT MULTIPLE CHOICE which of the following patterns of assimilation occurred most commonly amongst german immigrants to the united states in the early 1900s?a. accommodationb. anglo-assimilationc. population transferd. subjugation Wealth is not a scarce resource for most people (true/false) On average how many healthcare workers will be added each ear during this period? __________ is a business model in which the suppliers to a manufacturer handle the manufacturer's stock levels based on pre-established service levels.Vendor-managed inventory Dylan built the following pattern:reuse 08_07_ga_1_4Which table represents the relationship between the pattern number (Input) and the number of squares (Output)?Input Output1 42 83 16Input Output1 42 83 12Input Output1 12 43 9Input Output1 12 23 3Input Output8 48 812 12 this term refers to executive offices that are directly accountable to the president Mr. Dalip Bourne provides you with the following financial information for the years 2018 through 2021.2018: During this year, Dalip starts a new business which, during its first year of operations, has business income of $19,900. In addition, because of his love of the outdoors, he begins to carry on a farming business on a part time basis. The farming business experiences a loss of $10,900 in its first year of operation. Using the proceeds of an inheritance, he makes a number of investments in common shares during the year. In 2018, these investments pay $1,850 in eligible dividends. As the result of dispositions in the year, he realizes $1,340 in capital gains and $4,610 in capital losses.2019: This year Dalip's business has a business loss of $15,600. However, the farming business reports income of $2,200. Also during 2019, he receives $2,354 in eligible dividends and realizes capital gains of $2,100. He has no capital losses during the year.2020: Dalip's business income for the year is $32,900. In addition, the farming business reports income of $3,480. He receives eligible dividends of $3,170 and realizes capital gains of $4,500.Once again, no capital losses are realized.2021: Dalip's business experiences a business loss of $20,700. In addition, his farming business has a loss of $2,100. Although he receives $5,120 in eligible dividends, he is forced to sell some investments for much needed funds and realizes capital gains of $4,960and capital losses of $15,920.Because of the nature of his farming activities, Dalip's farm losses are restricted. All of the dividends received are from taxable Canadian corporations.When he has a choice, he would like to deduct the maximum amount of any net capital loss carry overs and carry back any losses to the earliest possible year. Prior to 2018, Dalip was a full-time student with no federal income tax payable. This means that it would not be useful to carry back any type of loss to years prior to 2018. Dalip requires $15,200 in taxable income in each year to fully utilize his available tax credits. In applying carry over amounts, Dalip's Taxable Income should not be reduced below $15,200.Calculate Dalip's minimum Net Income for Tax Purposes and Taxable Income for each of the four years. Indicate the amended figures for any years to which losses are carried back. Also indicate the amount and types of loss carry overs that would be available at the end of each year.Calculate Dalip's minimum Net Income for Tax Purposes and Taxable Income for 2018.(Round your answers to the nearest dollar.)The 2018 net income is $--------and the 2018 taxable income is $----------None of the losses can be carried back before 2018,so a 2018 restricted farm loss of $---------and a 2018 net capital loss of $----------can be carried over. a person walks first at a constant speed of 4.80 m/s along a straight line from point circled a to point circled b and then back along the line from circled b to circled a at a constant speed of 3.30 m/s.