answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashcka [7]
2 years ago
10

CHALLENGE ACTIVITY 3.7.2: Type casting: Reading and adding values.

Computers and Technology
1 answer:
dezoksy [38]2 years ago
5 0

Answer:

total_owls = 0

num_owls_A = int(input())

num_owls_B = int(input())

total_owls = num_owls_A + num_owls_B

print("Number of owls:", total_owls)

Explanation:

Initialize the  total_owls as 0

Ask the user to enter num_owls_A and num_owls_B, convert the input to int

Sum the num_owls_A and num_owls_B and set it to the total_owls

Print the total_owls

You might be interested in
Leo lives in a two-story home in an upscale neighborhood, drives a brand-new sports car, and makes more than $250,000 per year.
prisoha [69]
(D) Standard of living. Because, from this text you can tell that Leo is a wealthy person, and welthy people tend to get the best things, including fancy neighborhoods and Cars. So its most likely (D)
5 0
1 year ago
Read 2 more answers
Joe wants to use an engaging image as a hook in his presentation , but he’s afraid of violating any copyright law. What should h
vivado [14]

Answer:

he should cite the websites of where he got his information.

Explanation:

6 0
2 years ago
The it department is reporting that a company web server is receiving an abnormally high number of web page requests from differ
Talja [164]
<span>In the scenario in which the IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously the DDoS security attack is occurring.
</span>DDos stands for Distributed Denial of Service<span> . This </span><span>attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.</span>
8 0
1 year ago
Write a code segment to change the name of the Thing object something such that the new name consists of the old name with one c
ololo11 [35]

Answer:

import random

def name_change( name: list ) -> list :

   choice = random.choice( name )

   choice_index = name.index( choice )

   name.pop( choice_index )

   return name

Explanation:

The python source code above makes use of the random package to select an item from a list in the function "name_change" and the index of that item is gotten fro the list and popped from the list "name", then the name is returned.

To call the function, assign it to a variable and add a list ( must be a list ) as its argument then print the result.

6 0
1 year ago
1. (1 point) Which flag is set when the result of an unsigned arithmetic operation is too large to fit into the destination? 2.
patriot [66]

Answer:

(1) Carry flag (2) Overflow flag (3) Sign or negative Flag

Explanation:

Solution

(1) The carry flag : It refers to the adding or subtracting. a two registers has a borrow or carry bit

(2) The over flow flag: This flag specify that a sign bit has been modified during subtracting or adding of operations

(3) The sign flag: This is also called a negative sign flag is a single bit status in a register that specify whether the last mathematical operations  generated a value to know if the most significant bit was set.

8 0
2 years ago
Other questions:
  • Computer design software requires __________________ to be used properly and successfully by architects.
    9·2 answers
  • Where is the Name Manager dialog box found?
    13·1 answer
  • List at least six things you would check for if you were asked to evaluate the workspace of an employee for ergonomics
    10·1 answer
  • python A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun
    15·2 answers
  • What kinds of unstructured data or big data might the BITS corporation want to gather in the future? What kind of devices might
    14·1 answer
  • An attacker distributes hostile content on Internet-accessible Web sites that exploit unpatched and improperly secured client so
    11·2 answers
  • Access-lists pose a logical problem which often has more than one solution. Can you think of a different set of rules or placeme
    8·1 answer
  • Create a generic class Box with a type parameter that simulates drawing an item at random out of a box. This class could be used
    7·1 answer
  • Write a function summarize_letters that receives a string and returns a list of tuples containing the unique letters and their f
    15·1 answer
  • The properly marked source document states: (C) Operation Panda will take place on 29 September. The new document states: (C) On
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!