Python 4.5 code practice

Answers

Answer 1

Answer:

"Write a loop that inputs words until the user enters DONE. After each input, the program should number each entry and print in this format:"

"#1: you entered _____"

"When DONE is entered, the total number of words entered should be printed in this format:"

"A total of ___ words were entered"

count = 0

data = input('Please enter the next word: ')

while data != "DONE":

   count = count + 1

   print("#" + str(count) +": You entered the word " + data)

   data = input("Please enter the next word: ")

   

print("A total of "+ str(count) + " words were entered.")

Explanation:

we are counting starting from 0 when the user inputs a word the code then counts the word and stores is as data and continues until the user inputs DONE


Related Questions

Determine the value of a and b at the end of the following code segment:

int a = 5;
int b = 10;
a++;
b*=a;
a = b + b;

The value stored for a is _____ and the value stored for b is _____

Answers

Answer:

15 and b is 20

Explanation:

Answer:

a = 120 and b = 60

Explanation:

a++ means a = a+1

b*=a is the same as b= a*b

After plugging in the variables,

Here are the results in order:

a = 6;

b = 60;

a = 120;

We only keep the nearest declared value of the variable, so "a" would equal 120 and "b" would equal 60.  

A hexadecimal input can have how many values

Answers

Answer: Unlike the decimal system representing numbers using 10 symbols, hexadecimal uses 16 distinct symbols, most often the symbols "0"–"9" to represent values 0 to 9, and "A" to "F" (or alternatively "a"–"f") to represent values from 10 to 15.

Explanation:

What type of program would you use to create a personal budget?

Answers

Answer:

using Excel is the easiest way to create and use a budget, based on the formulas you can create to have the budget do the work for you, instead of vice versaExplanation:

What does the example of Friendster illustrate about social media platforms?

A.
People are loyal to social networking sites.

B.
Users will have little patience for technical issues.

C.
Professional networking sites are more popular than social networking.

D.
Most social media platforms don’t last more than a year.

Answers

Answer:

A

Explanation:

It's just what it's meant it doesn't need much explanation

People are loyal to social networking sites is example of Friendster illustrate about social media platforms.

What are social media platforms?

Websites and programs that emphasize collaboration, sharing of content, engagement, and community-based feedback are collectively referred to as social media.

Social media is used by people to connect and communicate with their friends, family, and other communities. Social media applications are used by businesses to track consumer complaints as well as market and promote their products.

Websites that cater to businesses selling to consumers have social features like comment sections for users. Businesses can track, evaluate, and analyze the attention their firm receives from social media, as well as brand perception and customer insight, using a variety of technologies.

Therefore, People are loyal to social networking sites is example of Friendster illustrate about social media platforms.

To learn more about Social media platforms, refer to the link:

https://brainly.com/question/29459870

#SPJ2

what are all the fallacies and their meanings

Answers

Answer:

i dont know you tell me

Explanation:

what is human computer interaction​

Answers

Explanation:

Human computer interaction is research in the design and the use of computer technology, which focuses on the interfaces between people and computers.

Answer:

It is the way humans interact with computers; interfaces, special effects, icons, and buttons, it does not end there. HCI can also be looked at as a study to see what [person] will do with the computer.

explain the claim that an operating system is the master controller of the computer system and it's importance to the information processing cycle ​

Answers

An operating system is a master control program due to the fact that it controls the functions of the computer system in all and also in the running of application programs. All computers cannot work without an operating systems.

What is the master controller of a computer?

The operating system is the master controller of the computer system as it is one that helps the PC to send and receive data.

A lot of distributed control system must have a Master Controller. The Master is said to have a board Microcontroller that is dedicated to performing different  functions.

Learn more about An operating system from

https://brainly.com/question/1763761

Do you think social robots would need to develop emotions when interacting with humans? Are there any risks if robots start feeling “emotions”? Should scientists really build such robots?

Answers

Answer:

Yes

There are big risks for robots feeling emotions. This is good and bad. Robots can feel happy, excited, and emotional, which would be good emotions, drawing them closer to humanity. The bad thing is, they can feel anger and regret as emotions. These emotions would not be good if you did not want robots to riot or be offensive. Scientists could build these robots, and just find a way to exclude these dangerous emotions. That way, we could have better robot helpers that are like family.

-learning computers with potato

A bitmap image is provided in two different resolutions. Image 1 has a resolution of 1500 x 1225. Image 2 has a resolution of 500 x
350. Which of the following statements is true when the sizes of both the files are increased by 25 percent?
a.
a
Select one:
Image 1 is less sharp and has a smaller file size than image 2.
O b. Image 2 is less sharp and has a larger file size than image 1.
O c. Image 1 is sharper and has a larger file size than image 2.
O d. Image 2 is sharper and has a larger file size than image 1.
Clear my choice

Answers

The true statement regarding the two (2) bitmap images is: C. Image 1 is sharper and has a larger file size than image 2.

What is a bitmap image?

A bitmap image or bitmap image file (BIF) is also referred to as a raster graphic and it is generally made up of bits or dots that are called pixels.

Additionally, it is dependent on the resolution (size) of an image file and as such it becomes blurry when enlarged.

In this scenario, image 1 would become sharper and larger in size than image 2 when the original bitmap image files are increased by 25 percent.

Read more on bitmap image here: brainly.com/question/25299426

touching touching color color is touelung ask What's your name? and wait NOUS MOUW mouse down? key pacmpressed distance to reset timer tamer gation of Sprite loudnese Dend aldur sensor value sensor button pressed Q. What is the function of the light blue blocks?

it is an Options Question. And the Options are: Motion. Operation. Sensing​

Answers

Answer:

Sensing.

These are all sensing blocks in a coding language called Snap! Build your own blocks. The same goes for Scratch.

The when touching brick calls a function if a sprite is touching a certain thing.

The mouse down calls a function when the mouse is down.

The reset timer declares a reset for the timer box.

Lastly, the when key pressed? declares that when a certain key is pressed, a function is called.

Answer:

sensing because the motion is green and operating is red.

Explanation:

A example of an
"ITERATIVE STATMENT"

Answers

Answer:

for(let i = 0: i <=5; i++) {

console.log(I)

}

Explanation:

An iterative statement repeats a body of code until the condition is not true. Here we declare an integer (i) and make it 0. Then the loop checks if the second part is true (i is less than or equal to 5), and if it is true, it executes the code inside the loop body, which logs i, and finally runs the last past, which increments i by one. When the second part becomes false, the loop exits.

Jae is a network consultant hired by a small business client. He has been asked to recommend a firewall solution. Given the relatively small size of the infrastructure, he suggests a firewall that provides integrated intrusion detection system/intrusion prevention system (IDS/IPS) functionality because a single device offering multiple functions is cost- and space-effective. What is the solution

Answers

The  solution to the issue above is to use Virtual firewall.

What is intrusion detection prevention systems?

The Intrusion detection systems (IDS) and intrusion prevention systems (IPS) is known to be a kind of system that often look into the network of a person.

It is often set up to identify the different incidents and logging information about them, hindering incidents, and reporting any issues to security administrators.

See options below

a. Virtual firewall

b. Next-generation firewall (NGFW)

c. Appliance firewall

d. Commercial software firewall

Learn more about intrusion prevention system from

https://brainly.com/question/14284690

Find the output for the following program​

Answers

Answer:

It is a mathematical function program that displays many results to a math problem. R is the result of the problem, and when X and Y are done multiplying, they then print the result of this problem. That is why it says...

Print(f"The result is {R}")

Do not mind the letter f! That is just an abbreviation for an f string, a commonly used function in Python used to make string concatenation easier.

I hope this answers your question, apologies for late notice, and have a great day!

Answer:

(R)

Explanation:

cleann approved

Analyze the given word pattern and choose the correct option.
If WORD is coded as 9753, then what is the code for DOOR?

Answers

Answer:

The code for DOOR would be 3775.

Explanation:

WORD - 9753

W - 9

O - 7

R - 5

D - 3

DOOR: 3775

If WORD is coded as 9753, then what is the code for DOOR would be = 3775.

What is word coding?

Word pattern coding is defined as the systematic representation of words using another word, figures or numbers. That is;

W = 9

O = 7

R = 5

D = 3

This means that for the word DOOR, the code would be;

D = 3

O = 7

O= 7

R= 5

Code for WORD= 3775

Learn more about word pattern coding here:

https://brainly.com/question/31283683

#SPJ2

2. While relaxing at home, you access your school's online library to complete your homework. This is a good example of
A. teens being addicted to their phones and the Internet.
B. a lack of proper infrastructure.
C. the Internet making research and learning easy.
D. the Internet making everyday tasks easier.

Answers

most likely going to be c

Accessing the school's online library from home showcases how the Internet simplifies research and learning.

Hence, The correct option is C.

The objective of this question is to assess your understanding of the positive impact the Internet has on research and learning.

It aims to evaluate your ability to identify and analyze the benefits of accessing online libraries from home.

Accessing your school's online library from the comfort of your home is a great example of how the Internet has made research and learning more convenient and accessible.

Instead of having to physically go to the library, you can now easily access a vast amount of resources and complete your homework from the comfort of your own home.

It's a wonderful way to take advantage of the benefits that the Internet offers for education.

Hence,

Option C is correct.

To learn more about a library visit:

https://brainly.com/question/31622186

#SPJ3

Which of the following is an example of a project assumption? Current service levels to customers will be maintained throughout the project. All new technology components should be compatible with existing platforms. The project is designed to decrease costs by 45 percent in the first year after installation. The implementation plan must not disrupt the work of fellow employees.

Answers

Answer:

Current service levels to customers will be maintained throughout the project

Explanation:

The project assumption in the given options is: "Current service levels to customers will be maintained throughout the project."

A project assumption is a statement or belief about the project that is considered to be true, without any concrete evidence or proof at the time. It is an assumption made at the beginning of the project, based on available information and expectations.

In the given options, the assumption "Current service levels to customers will be maintained throughout the project" implies that the project team assumes that the quality and level of service provided to customers will remain consistent and unaffected during the project's execution.

Thus, this assumption suggests that the project team anticipates that any changes or activities related to the project will not have a negative impact on customer service.

For more details regarding project assumptions, visit:

https://brainly.com/question/31716624

#SPJ6

list four ways to edit cell contents?

Answers

Answer:

text, formatting, formulas, and functions

Explanation:

1222222222222222222222222222222

Answers

Answer:

whats that bro

Explanation:

brainliest me bro

Complete the sentence. are filters between the internet and a computer network.

Answers

Answer:

Fire walls

Explanation:

Answer:

Firewalls

are filters between the internet and a computer network.

Explanation:

write down same applacations of AI in agrilcaltural health education and bussness​

Answers

Answer:

Crop and soil monitoring.

Insect and plant disease detection.

Livestock health monitoring.

Intelligent spraying.

Automatic weeding.

Aerial survey and imaging.

Produce grading and sorting

Briefly discuss what is the basic architecture of a computer system?

Answers

Answer:

From strictly a hardware aspect;

Explanation:

The basic architecture of a computer is the case (otherwise known as tower), the motherboard, and power supply unit. The case is used to house all of the necessary parts for the computer function properly. The motherboard will serve as the bridge between all other connections, and the power supply unit will deliver capable power to the rest of the system.

Which of the following are advantages of automatic updates?

They protect against viruses.

They protect against hackers.

They provide free software for your computer.

They keep your computer running at peak performance.

Answers

Answer:

They keep your computer running at peak performance.

This is the correct answer.

Answer:

A, B, and D

Explanation:

did and got correct

That’s a good point because of blank limitations

Answers

Answer:

I would assume so. Next time, please include the statement. Thank you!

I hope this helps, and have a wonderful day.

1. Why does a computer have different types of ports?

Answers

Answer:

Computer ports are classified into two types based on the protocols used. A protocol is a set of rules and standards to be followed during data transfer and communication. Usually, data is transmitted in a particular pattern.

Explanation:

for a ser of rules and standards to be followed during data transfer and communication

Draw a flowchart or write a pseudocode to represent the logic of a program that allows the user to enter two values. The program outputs the sum of and the difference between the two values

Answers

Answer:

Start input myNumber

Start input myOtherNumber

set myAnswer = myNumber + myOtherNumber output myAnswer stop

Explanation:

Pseudocode is a computer programming language that resembles plain English and is compiled or processed into the computer. It explains the solution to the problem. Sometimes used as a detailed step by step process in developing a program

What is the best action to take when filling a police report regarding identity theft ?

Answers

Question

•What is the best action to take when filling a police report regarding identity theft ?

Answer:

•Obtain a copy of your FTC Identity Theft Report. This will help you set up a recovery plan.

•Provide a photo ID. You'll need to prove your identity by providing identification, such as a driver's license or passport.

•Provide your address.

•Provide proof of identity theft.

Explanation:

#Let's Study

#I Hope It's Help

#Keep On Learning

#Carry On Learning

To prevent information from getting into the wrong hands, _____ measures are necessary. Select 2 options. extreme extreme spyware spyware threat threat physical security physical security digital security

Answers

Answer: physical security and digital security

Explanation:

Physical security and digital security are the two measures necessary to prevent information from getting into the wrong hands.Therefore, the correct options are C and D.

What is physical and digital security?

Physical security involves securing physical access to places where sensitive information is stored or processed, such as data centers, server rooms, or offices. This can include measures such as access control systems, surveillance cameras, and security guards.

Digital security involves securing digital access to sensitive information, such as passwords, encryption, firewalls, and antivirus software. These measures protect against unauthorized access, hacking, and other digital threats.

Extreme spyware and threat are not measures that would prevent information from getting into the wrong hands.Therefore, the correct options are C and D.

Learn more about physical and digital security, here:

https://brainly.com/question/22440462

#SPJ3

The question is incomplete, but most probably the complete question is,

To prevent information from getting into the wrong hands, _____ measures are necessary. Select 2 options. \

A. extreme spyware

B. threat

C. physical security

D. digital security

.Write a Basic program to display first 10 natural numbers
(using IF… THEN ..ELSE (or) FOR..LOOP)​

Answers

Explanation:

CLS

x=1

For I = 1 to 10

Print x;

x = x+1

Next I

End

Answer:

Using for loop:

int i=0;

for(i=1;i<=10;i++)

{

printf(“%d”,i);

}

Using while loop:

int i=1;

while(i<=10)

{

printf(“%d”,i);

i++;

}

Using do while loop:

int i=1;

do

{

printf(“%d”,i);

i++;

}while(i<=10);

Determine the value of a and b at the end of the following code segment:

int a = 5;
int b = 10;
a++;
b*=a;
a = b + b;

The value stored for a is _____ and the value stored for b is _____

Choices

120 and 60
60 and 30
5 and 10
30 and 60

Answers

Answer:

30 and 60

Explanation:

Different between barcode reader an

Answers

Different between barcode reader an


Explanation: not enough info
Other Questions
pls answer fast and make it be the right answer. if u answer it right u get brainliest and 5 stars and a heart what is 86% of 20?please help Use synthetic division to solve (4 x cubed minus 3 x squared 5 x 6) divided by (x 6). What is the quotient? 4 x squared minus 27 x 167 minus StartFraction 996 Over x minus 6 EndFraction 4 x squared 21 x 131 StartFraction 792 Over x 6 EndFraction 4 x squared 21 x 131 StartFraction 792 Over x minus 6 EndFraction 4 x squared minus 27 x 167 minus StartFraction 996 Over x 6 EndFraction. reference of generation of computers? Trigonometric ratios in right triangles. Find tan (b) in the triangle. A,b,c 3,4,5 Whats the correct answer How can the ocean floor be created and/or destroyed? QUESTION ; When you need to analyze a claim made by an author, what is your first step?ANSWERS ; 1. write down the articles key points 2. find the supporting evidence the author provides 3. decide if the evidence provided supports the authors claim 4. find the sentence that contains the authors claim. which of these will NOT help reduce c02 levels in the atmosphere? The figure (not drawn to scale) consists of a semicircle, one large rectangle, and one small rectangle,with dimensions as shown. The width of the small rectangle is 3 feet and its length is 3 times the width.50 ft The grouped frequency table below represents the lengths of the fingers of somestudents in centimetres.Length (x cm) Frequency (f)8 I WILL GIVE 20 POINTS TO THOSE WHO ANSWER THIS MATH QUESTION RIGHT NOOOO SCAMS PLEASE AND PLEASE EXPLAIN WHY THAT IS THE ANSWER D.62 you cant see it cause the picture too small but this is just another answer choice its not the answer Write down the numbers in condensed form 200+40+5+0,3+0,07 Bankruptcy:____.a. creates value for a firm.b. transfers value from shareholders to bondholders. c. technically occurs when total equity equals total debt. d. costs are limited to legal and administrative fees. e. is an inexpensive means of reorganizing a firm. #47 Choose the correct code assignment for the following scenario: 38-year-old with night blindness acquired a few years ago.A. H53.62B. H53.61C. H53.60D. H53.69 What could you multiply by to clear the fractions? Solve for xx.23(x + 4) = 59x + 1 When carrying out a liquid-liquid extraction using a separatory funnel, Group of answer choices the bottom layer, which always contains the organic product, is always removed first. the organic layer must always be dried with an anhydrous salt like MgSO4. separation of layers is most efficient when the separatory funnel is drained with the top on. the top layer is always removed first with a disposable pipet. Why do I keep taking deep breaths?? 80.89 divided by 8.425 GIVING BRAINLIEST NEED THIS RLLY SOON THANKS!