I have a variable that has responses of strongly agree to strongly disagree that is dummy coded strongly agree as 1 and strongly disagree as 5 that I want to make the response codes more logical I would need to: _________


a. collapse the dummy codes

b. all responses are an appropriate option

c. recode the dummy codes

d. create a secondary variable

Answers

Answer 1

The correct option is c. I want to make the response codes more logical I would need to Recode the dummy codes

How to recode the dummy codes?

To make the response codes more logical, you would need to recode the dummy codes. In this scenario, the variable is coded with values ranging from 1 to 5, representing different levels of agreement. However, the current coding may not align with the desired logical interpretation of the responses.

Recoding the dummy codes involves assigning new values to the existing codes to better reflect their intended meaning. For example, you could assign a value of 1 to strongly disagree and a value of 5 to strongly agree, providing a more intuitive representation of the responses.

This process typically involves modifying the variable values in the dataset using programming or statistical software. By recoding the dummy codes, you can ensure that the data accurately represents the respondents' levels of agreement, making it easier to analyze and interpret the results.

By selecting the option to recode the dummy codes, you can transform the variable into a more meaningful representation, enhancing the clarity and accuracy of your data analysis.

Learn more about codes

brainly.com/question/31967641

#SPJ11


Related Questions

what is the windows key sequence for typing the end-of-file indicator in command prompt window?

Answers

The key sequence for typing the end-of-file indicator in the Command Prompt window is Ctrl + Z. This key combination is used to end the input stream of a command. If you type this sequence when you are not entering input, the Command Prompt will close the input stream and return you to the command prompt.

The Ctrl + Z sequence is used as an EOF character in many command-line environments. The Ctrl + Z key combination is the equivalent of the Unix/Linux Ctrl + D end-of-file character. The EOF character is used to indicate the end of a file or stream of data.

The following are some of the keyboard shortcuts that are available in the Windows Command Prompt:

Ctrl + A: Move the cursor to the beginning of the line.

Ctrl + E: Move the cursor to the end of the line.

Ctrl + C: Abort the currently running command.

Ctrl + D: Send an EOF character.

Ctrl + F: Move the cursor forward one character.

Ctrl + B: Move the cursor backward one character.

Ctrl + L: Clear the screen.

Ctrl + R: Search command history.

Ctrl + Z: End the input stream of a command.

#SPJ11

Learn more about "Command Prompt" https://brainly.com/question/25808182

LAB: Word frequencies - methods Define a method named getWordFrequency that takes an array of strings, the size of the array, and a search word as parameters. Method getWordFrequency() then returns the number of occurrences of the search word in the array parameter (case insensitive). Then, write a main program that reads a list of words into an array, calls method getWordFrequency() repeatedly, and outputs the words in the arrays with their frequencies. The input begins with an integer indicating the number of words that follow. Assume that the list will always contain less than 20 words.
Ex: If the input is: 5 hey Hi Mark hi mark the output is: hey 1 Hi 2 Mark 2 hi 2 mark 2 Hint: Use the equalslgnoreCase() method for comparing strings, ignoring case. Hint: Use the equalslgnoreCase() method for comparing strings, ignoring case. The program must define and call a method: public static int getWordFrequency(String[] wordsList, int listSize, String currWord).

Answers

The program is an illustration of loops, functions and conditional statements

Loops are used for repetitionFunctions are used to group related code statements in a blockConditional statements are used to make decisions

The program in Java

The program written in Java, is as follows:

import java.util.Scanner;

public class Main {

   public static int getFrequencyOfWord(String[] wordsList, int listSize, String currWord) {

       int wordFreq = 0;

       for (int i=0; i<listSize; i++){

           if (wordsList[i].compareToIgnoreCase(currWord)==0){

               wordFreq++;

           }

       }

       return wordFreq;

   }

       public static void main(String[] args) {

           Scanner input = new Scanner(System.in);

           int N = input.nextInt();

           String myArr[] = new String[N];

           for (int i=0; i<N; i++){

               myArr[i] = input.next();

           }

           for (int i=0; i<N; i++){      

               String searchWord = myArr[i];

               int freqCount = getFrequencyOfWord(myArr,N,searchWord);

               System.out.println(searchWord + " " + freqCount);

       }              

  }

}

Read more about java programs at:

https://brainly.com/question/26642771

#SPJ1

SOx legislation requires that management designs the computer
system to be available for all.
True
False
Question 6
10 Points
the decision planning types are Blank 1, Blank 2, Blank 3

Answers

The decision planning types are an essential part of organizational decision-making. Those are Blank 1: strategic, Blank 2: tactical, and Blank 3: operational.

The decision planning types are strategic, tactical, and operational. These three types of decisions represent different levels of an organization and correspond to different timeframes and scopes.

1. Strategic decisions: Strategic decisions are made by top-level management and focus on long-term goals and overall direction. These decisions are crucial for the organization's success and involve allocating resources, setting objectives, and determining the overall strategy. Strategic decisions are typically made by executives and involve a broader perspective.

2. Tactical decisions: Tactical decisions are made by middle-level management and are more focused on implementing the strategic decisions. They involve short to medium-term planning and are aimed at achieving specific objectives and targets. Tactical decisions often deal with resource allocation, coordination between departments, and operational planning.

3. Operational decisions: Operational decisions are made by lower-level management and employees who are directly involved in day-to-day operations. These decisions are routine in nature and focus on the specific tasks and activities required to carry out the tactical plans. Operational decisions are made frequently and are based on established procedures and guidelines.

By understanding and distinguishing between strategic, tactical, and operational decisions, organizations can effectively align their goals, resources, and actions at different levels within the hierarchy. This helps ensure coordinated and efficient decision-making processes that contribute to the overall success of the organization.

To know more about Tactical Decision, visit

https://brainly.com/question/28986071

#SPJ11

referencing the lakehouse: what scale is indicated on the following view of the lakehouse? sections & details: wall section

Answers

The scale indicated on the view of the lakehouse wall section is 1/4 inch equals 1 foot.

The scale indicated on the view of the lakehouse wall section is 1/4 inch equals 1 foot. This means that every 1/4 inch on the drawing represents 1 foot in real-life dimensions. The scale is used to accurately depict the size and proportions of the wall section in relation to the actual dimensions of the lakehouse.

By using a scale, architects and designers can effectively communicate the design details to contractors, builders, and other professionals involved in the construction process. It ensures that everyone understands the measurements and specifications of the wall section, including the height, width, and thickness of the walls, as well as the placement of windows, doors, and other elements.

The 1/4 inch equals 1 foot scale is commonly used in architectural drawings and provides a good level of detail while still allowing for clear representation on standard-sized drawing sheets. It strikes a balance between providing sufficient information and keeping the drawing manageable and easy to read.

Learn more about Lakehouse

brainly.com/question/31169807

#SPJ11

What feature implemented in Windows 8.1 prevents the execution of non-trusted boot content, preventing rootkits?
A. Windows Defender
B. AppLocker
C. SecureBoot
D. Hyper-V

Answers

The feature implemented in Windows 8.1 prevents the execution of non-trusted boot content, including rootkits is C. SecureBoot.

Which feature implemented in Windows 8.1 prevents the execution of non-trusted boot content, including rootkits?

In Windows 8.1, the SecureBoot feature was implemented to prevent the execution of non-trusted boot content, thus enhancing security and protecting against rootkits.

SecureBoot is a feature of the Unified Extensible Firmware Interface (UEFI) firmware that ensures only trusted software is loaded during the boot process.

It verifies the digital signature of the boot loader and prevents the execution of any unauthorized or tampered boot components.

By enforcing the use of trusted boot components, SecureBoot helps to protect the integrity of the system and prevent the installation and execution of malicious software, including rootkits.

Learn more about Windows 8.1

brainly.com/question/14594383

#SPJ11

What plan can businesses use to protect sensitive data from malicious attacks?

Anti-spyware
Cybersecurity
Ethical hacking
Information assurance

Answers

Answer:

cybersecurity

Explanation:

it's either that or anti-spywhare but cybersecurity seems more likely

C ethical hacking
So no one will be able to access their information from hacking to their screen

arrange the code in the correct order to perform a search. assume the indenting will be correct.
a. Third part
b. Second part
c. Fifth part
d. Fourth part
e. First part

Answers

The correct answer for the question is option (D). B, C, D, E, F, A

The correct order of the code snippets to achieve the desired functionality is as follows:

1. Open a database connection (B).

2. Retrieve data from the database (C).

3. Perform data manipulation or calculations (D).

4. Display the results (E).

5. Close the database connection (F).

6. Initialize a variable with a default value (A).

By following this sequence, the code will establish a connection to the database, retrieve the required data, perform necessary operations, display the results, and finally close the connection.

Initializing the variable with a default value may not be directly related to the database functionality and can be placed at the end of the code sequence.

For more questions on database, click on:

https://brainly.com/question/518894

#SPJ8

I think it is the question:

Arrange the following code snippets in the correct order to achieve the desired functionality:

A. Initialize a variable with a default value.

B. Open a database connection.

C. Retrieve data from the database.

D. Perform data manipulation or calculations.

E. Display the results.

F. Close the database connection.

Options:

A. B, C, D, E, F, A

B. A, B, C, D, E, F

C. B, C, D, F, E, A

D. B, C, D, E, F, A

You areYou are a member of the application development organization for a small but rapidly growing software company that produces patient billing applications for doctors' offices. During work on the next release of your firm's first and only software product, you discover a small programming glitch in the current release that could pose a security risk to users. The probability of the problem being discovered is ɔw, but, if it is exposed, the potential impact on your firm's 100 or so customers could be substantial: Hackers could access private patient data and change billing records. The problem will be corrected in the next release, scheduled to come out in three months, but you are concerned about what should be done for the users of the current release. The problem has come at the worst possible time. The firm is currently seeking approval for a $10 million loan to raise enough cash to continue operations until revenue from the sales of its just

Answers

Answer:

Following are the solution to this question:

Explanation:

Please find the complete question in the attached file.

It will obtain as much information about this matter as necessary even before the conference. It includes its gravity or probability of risk, various cases in the entire event, the possible solutions to the issues, as well as the consequences for parties involved in each potential answer, and Only at conferences, it may clarify to my boss that the explanation for the problem and also in details. It will be doing everything possible and try not to conceal the details but highlight the problem.

You areYou are a member of the application development organization for a small but rapidly growing software

Select the correct answer.
David is creating an app that is optimized for a 4.7-inch screen. Which size category will he use when developing the app?
A.
xlarge
B.
large
C.
normal
D.
small

Answers

Answer:

large

Explanation:

You are calculating commissions for sales staff at work. Employees receive ten dollars for every item sold. Your boss also wants to know the grand total paid to all employees as commission. How would you set this up in an Excel workbook and would you use absolute references, relative references, or both?

Answers

Answer:

To find the grand total paid to all employees as commission, we note the following;

The amount received by employees as commission for each item sold, r = $10.00

The information the boss wants to know = The grand total paid to all employees as commission

Let 'n' represent the the total sales, we have;

The grand total commission = Total sales × Commission

1) On MS Excel, four columns are created, labelled, Serial number, Employee Name, Number of Items Sold, Commission

2) In the second row, in the cell under the Commission column heading, Input the formula '=(Cell reference of adjacent Number of Items Sold) × 10' in the cell

3) Copy the the above formula to all the cells in the Commission column by clicking on the cell containing the formula, moving the mouse to the bottom right corner of the cell, and when the mouse pointer changes to a cross sign, left click and hold and drag to all the cells in the column

4) Input the formula =SUM(Argument) in the blank cell below the created Commission list

Where;

Argument = The reference to the range of cells containing the values in the Commission column

5) The output of the =SUM formula is the grand total paid to employees as commission

Explanation:

How does the brain influence your emotions, thoughts, and values?

Answers

Amygdala. Each hemisphere of the brain has an amygdala, a small, almond-shaped structure. The amygdalae, which are a part of the limbic system, control emotion and memory and are linked to the brain's reward system, stress, and the "fight or flight" reaction when someone senses a threat.

What are the effects of the brain?Serotonin and dopamine, two neurotransmitters, are used as chemical messengers to carry messages throughout the network. When brain areas get these signals, we recognize things and circumstances, give them emotional values to direct our behavior, and make split-second risk/reward judgments.Amygdala. The amygdala is a small, almond-shaped structure found in each hemisphere of the brain. The limbic systems' amygdalae control emotion and memory and are linked to the brain's reward system, stress, and the "fight or flight" response when someone perceives a threat.Researchers have demonstrated that a variety of brain regions are involved in processing emotions using MRI cameras. Processing an emotion takes happen in a number of different locations.

To learn more about Amygdala, refer to:

https://brainly.com/question/24171355

#SPJ1

Interactive sites where users write about personal topics and comment to a threaded discussion are called?
A. chat rooms.
B. networking sites.
C. forums
D. messaging sites.

Answers

Answer:

C. forums

Explanation:

Forums are internet sites where users can meet to discuss different topics through the use of messages thereby forming chat rooms. An internet forum can be in form of a question and answer site. Most websites have internet forums where users can meet and discuss or ask questions. Sometimes there may be moderators that ensure that the posted messages are acceptable based on guidelines.

Enumerate all the function calls, returns, and exception events occurred while executing the following ML code.exception X of int;let fun f(y) = (raise X(y); 1); fun g() = f(1) handle X(y) => y+1in g() handle X(y) => yend;

Answers

The ML code provided contains two functions, f(y) and g(). Function f(y) raises an exception event X(y) with an integer parameter y and returns the integer value 1. On the other hand, function g() calls function f(1) and handles any exception event X(y) that might occur during the execution of f(1).

Specifically, function g() returns the result of adding 1 to the parameter y of the exception event X(y) that was caught during the execution of f(1). If no exception event occurs during the execution of f(1), function g() returns the integer value 1.When the code is executed, the first function call is g(), which executes function f(1) and handles any exception event that might occur. If an exception event X(y) is raised during the execution of f(1), the exception event is caught by the handler in g(), and the integer value of y plus 1 is returned. If no exception event is raised during the execution of f(1), the integer value 1 is returned.Therefore, the function calls are g() and f(1), and the returns are y+1 (if an exception event is raised) or 1 (if no exception event is raised). The exception event X(y) is the only exception event that occurs during the execution of the code, and it can be raised by function f(y) when it is called with an integer parameter. The handler in function g() catches this exception event and handles it appropriately.

For such more question on parameter

https://brainly.com/question/29673432

#SPJ11

Here are all the function calls, returns, and exception events that occur while executing the given ML code:

Function call: g()

Function call: f(1)

Exception event: X(1) is raised

Exception handler: handle X(y) => y+1

Exception event: X(1) is caught and the handler evaluates y+1 = 2

Function return: 2

Function return: 2 (value returned by g())

Therefore, the output of executing the code is 2.

Learn more about function here:

https://brainly.com/question/12431044

#SPJ11

Discuss how the use of digital formats for audio-visual recording and editing has
transformed the film world.

Answers

Answer:

Digital formats allow for lossless data storage, fast editing (without the loss of original source material, ie having to manually clip pieces of film), and made collaboration easier.

which of the following do you typically see in a convnet? a. multiple conv layers followed by a pool layer. fc layers in the last few layers. b. multiple pool layers followed by a conv layer. fc layers in the first few layers. c. multiple pool layers followed by a conv layer. fc layers in the last few layers. d. multiple conv layers followed by a pool layer. fc layers in the first few layers.

Answers

A pool layer comes after several conv layers fc layers in the final few levels, several pool layers, and a conv layer beyond that In a convnet, fc layers can be seen in the final few levels.

What is a fc layer?

A high-speed data transfer technology called Fibre Channel (FC) offers lossless, in-order delivery of raw block data. Fibre Channel is largely utilized in storage area networks (SAN) in commercial data centers to link servers and computer data storage.

The switches in a network function together as one large switch in Fiber Channel networks, forming a switched fabric. Although copper cabling can sometimes be used, fiber channel primarily uses optical fiber cables to connect data centers to one another.

Because of advancements in subsequent technological generations, supported data speeds now range from 1, 2, 4, 8, 16, 32, 64, and 128 gigabit per second. This is currently known as Gigabit Fibre Channel in the industry (GFC).

Hence, A pool layer comes after several conv layers fc layers in the final few levels, several pool layers, and a conv layer beyond that In a convnet, fc layers can be seen in the final few levels

To learn more about fiber channel refer to:

https://brainly.com/question/28045778

#SPJ4

Refer to the exhibit. Based on the output that is shown, what kind of IPv6 addressing is being configured? R1# show running-config ! ipv6 dhcp pool IPV6 ! dns-server 2001: DB8:1234:5678::100 domain-name netacad.com interface FastEthernet0/0 ! ! ipv6 nd other-config-flag ipv6 dhcp server IPV6

Answers

The kind of IPv6 addressing that is being configured based on the output shown is DHCPv6. DHCPv6 stands for Dynamic Host Configuration Protocol for IPv6.

It is a client/server protocol that is used for assigning configuration parameters to IPv6 hosts. The DHCPv6 server assigns a temporary IPv6 address (IA_NA) to the client. In addition to an IPv6 address, the DHCPv6 server can also assign other configuration parameters to the client like domain name, DNS server address, etc.Explanation:The IPv6 addressing being configured is DHCPv6.DHCPv6 stands for Dynamic Host Configuration Protocol for IPv6. It is a client/server protocol that is used for assigning configuration parameters to IPv6 hosts. The DHCPv6 server assigns a temporary IPv6 address (IA_NA) to the client. In addition to an IPv6 address, the DHCPv6 server can also assign other configuration parameters to the client like domain name, DNS server address, etc.DHCPv6 allows IPv6 clients to request configuration information from a DHCPv6 server. DHCPv6 has two types of messages: solicit messages and request messages. Clients send solicit messages to locate IPv6 addressing and to request configuration information. After a DHCPv6 server receives a solicit message, it responds with an advertise message that contains the configuration information for the client. Once the client receives the advertise message, it sends a request message to the DHCPv6 server to confirm the configuration parameters.

Learn more about IPv6 addressing here:

https://brainly.com/question/30402808

#SPJ11

The value 5 is stored in a signed (2's complement) integer. The bits are shifted 4 places to the right. What is the resultant value (in decimal)? 0.3125

Answers

Answer:

The resultant value is 0

Explanation:

Solution

Given that:

Now

The +5 representation in signed 2's complement integer: 00000101

Thus

When we right shift then, 4 rightmost bit (0101) will be dropped.

The number after 4-bit right shift: 00000000

Therefore the resultant value after 4-bit right shift is "0" in decimal.

all of the following is the wiring of front panel EXCEPT ONE. a.power supply b.reset sw c.hard drive d.optical drive​

Answers

The correct answer is PWRSW (Power supply ) is a programme that manages the power button used to switch on and off computers. Reset SW - Controls the computer's restart button. Speaker.

On the motherboard, connect the Power SW cable above the Reset SW. As a result, you will be able to start your computer by pressing the power button on the front of your PC case. port USB. The majority of USB ports on desktop computers are located on the case's rear. The front USB ports should be left open so that they may be used for digital cameras and other devices, and you should usually attach your mouse and keyboard to these ports.The power supply for your PC almost always has a 4+4-pin, an 8-pin connection that splits in half.

To learn more about Power supply click the link below:

brainly.com/question/28875612

#SPJ4

By inspecting the raw data in the packet content window, do you see any headers within the data that are not displayed in the packet-listing window? if so, name one.

Answers

No, even though the raw data and the information displayed in the packet-listing window appear to match identically, we don't see any headers.

Describe the HTTP GET Method.

When requesting data from a specific source, the HTTP (HyperText Transfer Protocol) GET method is utilized. Additionally, it can be used to isolate a certain variable from a group. The HTTP POST method asks the providing browser to send data into the server's message system. The GET method and the POST method can both be used to access HTML structures. Whether the POST method or the GET method is chosen, it will affect how form data is sent to the server. For Example-

GET /hello.htm HTTP/1.1

User-Agent: Mozilla/4.0 (compatible; MSIE5.01; Windows NT)

Host: www.checkers.com

Accept-Language: en-us

Accept-Encoding: gzip, deflate

Connection: Keep-Alive

Learn more about HTTP here:

https://brainly.com/question/13152961

#SPJ4

Are DVD players, USBs, printers/scanners, guitar amps, satellite dishes, headphones, dishwashers, radios, and modern cars considered computers?

Answers

Answer:

yes

Explanation:

um ik for sure that a printer/scanner is a computer in a way^^

Answer:

yes they are considered!

Explanation:

they are conisdered computers due to having an interioir machine, which has been engineered to perfrom certain tasks, just like a computer.

The index finger types

Answers

Answer:

(btw not trolling what is this question?)EZ answers friend and put THANKS in my profileEZ answers friend and put THANKS in my profileEZ answers friend and put THANKS in my profileEZ answers friend and put THANKS in my profileEZ answers friend and put THANKS in my profileEZ answers friend and put THANKS in my profileEZ answers friend and put THANKS in my profileEZ answers friend and put THANKS in my profileEZ answers friend and put THANKS in my profile

Explanation:EZ answers friend and put THANKS in my profileEZ answers friend and put THANKS in my profileEZ answers friend and put THANKS in my profileEZ answers friend and put THANKS in my profileEZ answers friend and put THANKS in my profileEZ answers friend and put THANKS in my profileEZ answers friend and put THANKS in my profileEZ answers friend and put THANKS in my profileEZ answers friend and put THANKS in my profileEZ answers friend and put THANKS in my profileEZ answers friend and put THANKS in my profileEZ answers friend and put THANKS in my profileEZ answers friend and put THANKS in my profile

EZ answers friend and put THANKS in my profile

A type of topology in which all the systems a connected a main cable ​

Answers

Answer:

Bus topology uses one main cable to which all nodes are directly connected. The main cable acts as a backbone for the network. One of the computers in the network typically acts as the computer server. The first advantage of bus topology is that it is easy to connect a computer or peripheral device.

Which statement describes a possible cause of algorithmic bias?
A. An algorithm miscalculates the data that is entered and doesn't
filter out unwanted data.
B. A programmer writes his own worldview into an algorithm,
privileging one group of users over others.
C. There is a shortage of good algorithms to solve complex problems
or issues.
D. A programmer fails to analyze the problem fully and break it down
into smaller parts.

Answers

The statement which best describes a possible cause of algorithmic bias is that a programmer fails to analyze the problem fully and breaks it down into smaller parts. Thus, the correct option for this question is D.

What is Algorithm bias?

Algorithm bias may be defined as systematic and repeatable errors in a computer system that significantly construct unfair outcomes in a given set of instructions by the user.

There are three main causes of algorithmic bias: input bias, training bias, and programming bias. Algorithmic outcomes oftentimes labeled as “biased” may simply reflect unpleasant facts based on causal relationships derived from reliable representative data.

Therefore, a programmer fails to analyze the problem fully and break it down into smaller parts is the statement that best describes a possible cause of algorithmic bias.

To learn more about Algorithm bias, refer to the link:

https://brainly.com/question/29523555

#SPJ1

----------------------------
Please summarize into 1.5 pages only
----------------------------
Virtualization
Type 2 Hypervisors
"Hosted" Approach
A hypervisor is software that creates and runs VM ins

Answers

Virtualization: It is a strategy of creating several instances of operating systems or applications that execute on a single computer or server. Virtualization employs software to reproduce physical hardware and create virtual versions of computers, servers, storage, and network devices. As a result, these virtual resources can operate independently or concurrently.

Type 2 Hypervisors: Type 2 hypervisors are hosted hypervisors that are installed on top of a pre-existing host operating system. Because of their operation, Type 2 hypervisors are often referred to as "hosted" hypervisors. Type 2 hypervisors offer a simple method of getting started with virtualization. However, Type 2 hypervisors have some limitations, like the fact that they are entirely reliant on the host operating system's performance.

"Hosted" Approach: The hosted approach entails installing a hypervisor on top of a host operating system. This hypervisor uses hardware emulation to create a completely functional computer environment on which several operating systems and applications can run concurrently. In general, the hosted approach is used for client-side virtualization. This method is easy to use and is especially useful for the creation of virtual desktops or the ability to run many operating systems on a single computer.

A hypervisor is software that creates and runs VM instances: A hypervisor, also known as a virtual machine manager, is software that creates and manages virtual machines (VMs). The hypervisor allows several VMs to execute on a single physical computer, which means that the computer's hardware can be utilized more efficiently. The hypervisor's role is to manage VM access to physical resources such as CPU, memory, and I/O devices, as well as to provide VM isolation.

Know more about virtualization, here:

https://brainly.com/question/31257788

#SPJ11

Help debugging line 7 type error more arguments (5) than expected (1)

Help debugging line 7 type error more arguments (5) than expected (1)

Answers

Answer:

import random

score = 0

for i in range(5):

   num1 = random.randint(1, 100)

   num2 = random.randint(1, 100)

   prompt = "What is " + str(num1) + "+" + str(num2) + "?"

   answer = int(input(prompt))

   result = (num1, num2)

   if answer == result:

       print("Well done!")

       score += 1

   else:

       print("incorrect")

print("Your score was", score)

Explanation:

Your error is on line 7, where you are providing multiple arguments to the input function, instead of 1.

One way to solve this is to create a variable prompt and concatenate all strings and variables within that variable to use for the input.

which of the following explains why gives directions to a location for creating an algorithm

A.An algorithm provides step-by-step instructions

B.An algorithm is written in a computer code

C. An algorithm gives different steps each time it is used

D.An algorithm posts directions on a website.​

Answers

I am pretty sure it is D but if not I’m sorry
Iehennsjdjejejrndnndmekrndnxbshje D

northern trail outfitters wants to send an automated second email to subscribers who engaged with the original email. which sending method should they use?

Answers

When a subscriber clicks the link, the system determines which list the email was sent to and changes the subscriber's status for that list to "Unsubscribed." The system removes the subscriber from each list where they are a member if the email was sent to more than one list they are a member of.

Which feature allows a marketer to customize the content of an email?

You can alter the content by using: Individualization strings: Include subscriber attributes in the subject line, preheader, or body of your email, such as the subscriber name.

How may a subscriber choose the simplest method to unsubscribe from one email list?

The Manage Subscriptions link, which offers unsubscribe choices, is available for use by subscribers. Alternatively, they can choose One-Click Unsubscribe, which removes the subscriber from the list the send came from.

To know more about Unsubscribed visit :-

https://brainly.com/question/16826615

#SPJ4

What’s 9- 4 x y + 44 - -8
and what is 77 - 1.3 + -22

Answers

Answer:

1. -4y + 61

2. 53.7

A _______ is a group of elements that you want to style in a particular way.

a. id
b. element
C. class

Answers

a id is a group of elements of that you want to style in a particular way

Answer:

Brainliest

Explanation:

C. class

How to make recvfrom only work in a certain thread python udp.

Answers

Answer:

just put the in and out Intil it

Explanation:

Other Questions
can someone helppppp Which of the following is a solution tothe equation 0 = x2 8x 13? 1. the step pattern for a minor scale is (1 point) w-h-w-w-h-w-w. h-h-w-w-w-h-w. w-w-h-h-w-w-w. w-h-h-w-w-h-w. if a company receives $100,000 cash in exchange for issuing 100 bonds at $1,000, the bonds were issued at . Please help, I will give brain list. If the function y = ez is vertically compressed by a factor of 9, reflected across the x-axis, and then shifted down 9 units, what is the resulting function? Write your answer in the form y = ce^2 + b Find the area of the figure.Use 3.14 let s be the set of all vectors of the form [ 5 s 4 s ] . find a set of vectors in r 2 whose span is s . use as many of the answer boxes as needed, filling from left to right. leave unneeded boxes empty. what was the future consequences of the colony success of the stamp act If you are able to change Uranium into Bismuth, what type of reaction are you doing?Chemical ReactionNuclear ReactionFusion ReactionSynthesis ReactionWhat is the maximum number of electrons in the second principal energy level? (Remember the octet rule?) (What is the optimal # of electrons on the outside for stability?)2 points832218Covalent network solids such as graphite, quartz, and diamondare all made entirely of carbon atomsare held together by ionic bondshave very high melting and boiling pointsare soft and slipper An object moving at speed s for time t travels distance st. The Brown family is taking a road trip. This morning, they drove for 2. 5 hours at a speed of 65 miles per hour. How far did the family drive this morning?Write your answer as a whole number or decimal Which disease is a risk for people who dont consume enough iron rich foodsA.bulimiaB.heart disease C.anemiaD.anorexiaIf u can please give an explanation 1. 1. are the charged parts of an atom.a. Only electronsb. Only protonsc. Neutrons onlyd. Electrons and neutronse. Electrons and protonsf. Protons and neutrons Help!!!!!! See image. Which choice is a term in this expression? 3x 7(x + 4) Arectangle is dilated by a scale factor of n = 1. Which statement is true regarding the image of the dilation?O The image will be smaller than the pre-image because n =1.O The image will be congruent to the pre-image because n=1.O The image will be larger than the pre-image because n =1.O The image will be a triangle because n =1. The composite figure is made up of three simpler shapes. What is the area of the figure?Please explain how you got your answer, please. Assuming that xyz corporation has annual net sales of $468,000,000 and annual cost of goods sold of $351,000,000, what is the inventory turnover ratio for xyz corporation? a 1:1 b 2:1 c 3:1 d 4:1 What are the most important advantages and disadvantages of online classes? Explain how to write an equation for the line that contains the point (2, -3) and is perpendicular to thegraph of x + 2y = 2