integer usernum is read from input. write a while loop that reads integers from input until an integer that is greater than or equal to 10 is read. then, find the sum of all integers read. the integer greater than or equal to 10 should not be included in the sum.

Answers

Answer 1

To solve this problem we need to use a while loop to read integers from input until an integer greater than or equal to 10 is read, and then find the sum of all the integers read (excluding the integer greater than or equal to 10).

To solve this problem, we need to first read the integer usernum from input. Then, we need to create a while loop that continues to read integers from input until an integer greater than or equal to 10 is read. Within the while loop, we will also calculate the sum of all the integers that are read, excluding the integer greater than or equal to 10.

Here's some sample code to illustrate this:

```
usernum = int(input("Enter an integer: "))
sum = 0
while usernum < 10:
   sum += usernum
   usernum = int(input("Enter another integer: "))
print("The sum of the integers is:", sum)
```

In this code, we start by reading the integer usernum from input using the `input()` function and converting it to an integer using the `int()` function. We also initialize a variable called `sum` to 0, which we will use to keep track of the sum of all the integers read.

Next, we create a while loop that continues to execute as long as the value of `usernum` is less than 10. Within the loop, we add the value of `usernum` to the `sum` variable and then read another integer from input using the `input()` and `int()` functions. This process continues until an integer greater than or equal to 10 is read, at which point the loop terminates.

Finally, we print out the sum of all the integers that were read (excluding the integer greater than or equal to 10) using the `print()` function.

In summary, to solve this problem we need to use a while loop to read integers from input until an integer greater than or equal to 10 is read, and then find the sum of all the integers read (excluding the integer greater than or equal to 10).

Learn more about integer usernum here:

https://brainly.com/question/21661364

#SPJ11


Related Questions

C provides a data structure, the ___________, which stores a fixed-size sequential collection of elements of the same type.

Answers

Answer:

Array

Explanation:

The array is a data structure in C that can hold a predefined quantity of the same type of element in an ordered fashion, and can be defined with the following syntax: type name[amount] = {elements}; where type is the type (like int), amount is the capacity it should be defined at, name is what you want to name the array, and elements are a comma separated list of elements to initialize the array with. You can also change the values of elements by using this syntax: name[index] = newelement; where index is which index to change, and new element is what to set it to.

Use the drop-down menus to describe how Adnan can add shapes to his presentation.

Which command group in the Insert tab should he click?


Which cursor would appear on the slide?


Which combination of actions should he take to insert the shapes on the slide?

Answers

Answer:

✔ Illustrations

✔ a crosshair

✔ left-click and drag

Explanation:

Answer:

1) Illustrations

2) a crosshair

3) left-click and drag

Explanation:

Zelda has been a victim of cybersecurity attacks twice, losing considerable sums of money each time. How can she ensure that she does not become a victim to it again? Select all that apply.

A. She must not open email attachments that she hasn’t been expecting.

B. She should try and carry her own WiFi, or create a hotspot using her phone, and avoid unprotected public WiFi networks.

C. She should configure all her gadgets to download and install security updates automatically.

D. She should absolutely not share passwords or account info with anyone.

Answers

Answer:

A. She must not open email attachments that she hasn’t been expecting.

B. She should try and carry her own WiFi, or create a hotspot using her phone, and avoid unprotected public WiFi networks.

C. She should configure all her gadgets to download and install security updates automatically.

D. She should absolutely not share passwords or account info with anyone.

All of the above

She must not open email attachments that she hasn’t been expecting. and She should try and carry her own WiFi, or create a hotspot using her phone, and avoid unprotected public WiFi networks.

What is Cybersecurity?

Protecting systems, networks, and programs from cyberattacks is the practice of cybersecurity. These hacks typically try to disrupt regular corporate operations, extort money from users through ransomware, or access, alter, or delete important information.

Today, there are more devices than humans, and attackers are growing more creative, making it difficult to implement effective cybersecurity measures.

Multiple layers of security are dispersed across the computers, networks, programs, or data that one wants to keep secure in an effective cybersecurity strategy.

Therefore,  She must not open email attachments that she hasn’t been expecting. and She should try and carry her own WiFi, or create a hotspot using her phone, and avoid unprotected public WiFi networks.

To learn more about Cybersecurity, refer to the link:

https://brainly.com/question/27560386

#SPJ2

which of the following is NOT a step to successful collaboration?

which of the following is NOT a step to successful collaboration?

Answers

Answer: C is correct

Explanation: you should be hearing everyone out, not trying to convince people that you are right.

Give a brief explanation about the internet.plsssss

Answers

Answer:

The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.

Explanation:

INTERNET is a short form of Interconnected Network of all the Web Servers Worldwide. It is also called the World Wide Web or simply the Web.

Agents must submit the original documentation for enrollment within 24 hours after the application data has been entered into the agent portal.

Answers

Agents must submit the original documentation for enrollment within 24 hours after the application data has been entered into the agent portal is a true statement.

What is documentation?

This is known to be a kind of knowledge management and knowledge organization, and it is one that entails or that is done on paper, online, or  others.

Note that the purpose of documentation is so that one can be able to Describe the use, operation, maintenance as well as other kinds of processes.

Hence, Agents must submit the original documentation for enrollment within 24 hours after the application data has been entered into the agent portal is a true statement.

Learn more about documentation from

https://brainly.com/question/25534066

#SPJ1

northern trail outfitters is using one profile for all of its marketing users, providing read-only access to the campaign object. a few marketing users now require comprehensive edit access on campaigns. how should an administrator fulfil this request

Answers

Configure the login policy to demand that users log in using https://nto.my.salesforce.com.

A purposeful set of rules designed to direct behavior and produce logical results is called a policy. A policy is a declaration of intent that is carried out through a method or protocol. Typically, a governance board inside a company adopts policies. Both subjective and objective decision-making can benefit from policies. Policies used in subjective decision-making typically aid senior management with choices that must be based on the relative merits of a variety of aspects, and as a result, are frequently challenging to assess objectively. An example of a policy used in this manner is the work-life balance policy. In addition, governments and other institutions have policies in the form of laws, rules, guidelines, administrative procedures, rewards, and voluntary practices. Resources are frequently distributed in accordance with policy choices.

Here you can learn more about policy in the link brainly.com/question/28024313

#SPJ4

What is digital graphics?
How are they used in the Entertainment Industry?
Why are they used in the Entertainment Industry?

Answers

Answer:

1) its what they use to make things

2)to make things like dinosaurs

3) it makes these things look real

Explanation:

Answer:

-Digital graphics combine text and images to produce a graphic product which cane used for s specific purpose. By using both writing and images they can present an idea or a message in an eye-catching and effective way. They can be printed or used onscreen.

-Digital graphics can simply be produce to entertain people.

-The graphics included in multimedia or game products are also obvious examples of graphics designed to entertain. Part of entertaining can be to grab the attention of potential readers so that they are more likely to think about buying the product.

it appears this account relationship is not online banking enabled

Answers

Check your options to make sure you didn't hide the account. Restart your browser after clearing your cookies and memory cache. After that, try logging back into your online bank. Ensure that the web browser you're using is compatible.

What does the relational bank account look like?

The Relationship Bank Account (RBA) is remarkably similar to a bank checking account. You can put money into the relationship and strengthen it, or you can take withdrawals and make it weaker. Consistent investments made over a long period of time always result in a robust and healthy partnership.

What does a relationship account serve as?

Relationship Banking: What Is It? Relationship banking is a tactic adopted by banks to increase client loyalty and offer a centralized point of contact for a variety of products.

To know more about cache visit:-

https://brainly.com/question/28232012

#SPJ1

Alexis wants to learn HTML and CSS. She wants to test her coding skills in these design languages. How can she practice her code-writing ability? Alexis can learn and implement her knowledge about HTML and CSS by practicing on websites.

Answers

Answer:

DIY

Explanation:

Alexis wants to learn HTML and CSS. She wants to test her coding skills in these design languages. How

What does disabled clipboard mean on Proctorio?

Answers

Proctorio disables the computer's clipboard by disabling its system's ability to paste and copy information. Copying and pasting text from or into the exam window as it is open is not permitted.

Describe a computer.

A computer is indeed a piece of electrical equipment used to manipulate data or information. It will have the power to store, acquire, and process data. You probably are aware of the reality that you are able use a computer to play games, send emails, browse the web, and compose papers.

What word best sums up a computer?

A computer is an item or equipment that follows instructions from a hardware or software program to carry out tasks, computations, and activities.

To know more about computer's visit:

https://brainly.com/question/20414679

#SPJ1

Final answer:

In Proctorio, 'disabled clipboard' means that the copy and paste feature has been turned off to maintain the integrity of exam processes. This restricts cheating by stopping students from pasting in outside information or sharing the test questions or answers.

Explanation:

In the context of Proctorio, a tool used predominantly for online proctoring during exams, 'disabled clipboard' means that the copy-paste feature has been disabled. This is often done to maintain the integrity of the examination process, preventing students from copying and pasting information from outside sources into the test. It also restricts the capacity for sharing test questions or answers inappropriately.

It's important to note that these set measures can vary depending on the settings chosen by the instructor or institution administering the exam. Some may enable the clipboard, some may limit its usage, and others might disable it entirely.

Learn more about Disabled Clipboard here:

https://brainly.com/question/32111024

heat pump in the heating mode, what effect will closing off registers in rooms that are uninhabited have

Answers

Closing off registers in uninhabited rooms while a heat pump is in heating mode can have a negative effect on the overall heating efficiency of the system.

Heat pumps work by transferring heat from the outside air to the inside of a home. When registers in uninhabited rooms are closed, the system may still be circulating air to those areas, which can cause the heat pump to work harder to maintain the desired temperature in the rest of the home. This can lead to higher energy consumption and utility bills.

Heat pumps rely on the circulation of air throughout a home to effectively distribute warm air during the heating mode. When registers in uninhabited rooms are closed, the overall airflow throughout the system can be reduced, causing the heat pump to work harder to maintain the desired temperature in other areas of the home. This is because the heat pump may still be circulating air to those areas, even if the registers are closed, which can lead to a reduction in overall efficiency. Closing off registers in uninhabited rooms can also cause pressure imbalances within the system, which can lead to increased air leakage and reduced overall performance. This is because the heat pump may be trying to force air into areas that have been closed off, which can cause air leaks at other points in the system.

To know more about uninhabited visit:

https://brainly.com/question/31079939

#SPJ11

When the registers in uninhabited rooms are closed, the heated air from the heat pump will flow to the other rooms with opened registers. It will cause an increased flow of heated air to the occupied rooms that can lead to overheating and reduced energy efficiency.

Heat pumps in the heating mode work by extracting heat from the outside air and transfer it inside the home using a refrigerant. This system works well in moderate winter climates but may struggle in extreme winter conditions. The registers, also known as vents or grilles, are the openings on the walls, ceilings, or floors that supply heated air to the rooms. They should not be closed in any rooms, even if they are uninhabited, because it can cause a lack of proper airflow in the heating system and damage the unit.

When a homeowner closes off the registers in uninhabited rooms, it can create an imbalanced airflow in the heating system. The heat pump still operates, but the heated air that should be distributed to the closed rooms has nowhere to go. It causes a pressure build-up, which can reduce the system's efficiency and lead to overheating and damage. Furthermore, the increased flow of heated air to the occupied rooms can make the thermostat think that the house is hotter than it is. Therefore, the heat pump will keep running, increasing energy consumption and the utility bill. The closed registers can also increase the pressure in the ductwork, leading to leaks or system failure.

To know more about uninhabited visit:

https://brainly.com/question/14598309

#SPJ11

Help Digital photo class

Help Digital photo class

Answers

Answer: i think the answer is c

Explanation:

Answer:

Here’s your answer!

Explanation:

I believe the answer to be D however if the camera still doesn’t work visit a camera shop for help.

Hope this helped

Brainliest please?

Dont forget to smash that heart at the bottom <3

Have a great day,you’re amazing!

when performing a binary search on list for 75 after the first iteration the search is restricted to

Answers

Binary search is a process of finding a specific target value from a list of ordered elements. In each step, it divides the search space in half and consequently reduces the search range by half at each iteration.

The search range narrows down to a single element until the desired value is found, or the search range is empty. Let's look at the binary search of list for 75.The list of ordered elements in which we want to search for the number 75 could be {10, 20, 30, 40, 50, 60, 70, 75, 80, 90, 100}. Let us assume that the list is sorted in increasing order.

The algorithm starts by dividing the list in half and checking whether the middle element is the target number or not. If the middle element is equal to the target, the search ends, and the target number is found. Since 75 is less than 80, the search space is further restricted to the left half of the right half, which includes {60, 70, 75}.Finally, the algorithm divides the remaining list in half, and the middle element is 70.

Since 75 is greater than 70, the search space is restricted to the right half, which is {75}. Since the target number 75 is found, the search ends, and the index of 75 in the original list is returned.The binary search algorithm is efficient in searching for a target value in large ordered lists. It takes O(log n) time complexity, where n is the number of elements in the list. Therefore, if the list contains a million elements, it would take at most 20 iterations to find the target value.

To know more about algorithm visit:

https://brainly.com/question/28724722

#SPJ11

What is 540 to the nearest TENTH?​

Answers

Answer:

500

Explanation:

no explanation, sorry

lafa elihle kakhulu poem​

Answers

I’m pretty sure it is Telgu

Considering the size of your dataset, you decide a spreadsheet will be the best tool for your project. You proceed by downloading the data from the database. Describe why this is the best choice.

Answers

For processing and analyzing a small dataset, like the one you're using, spreadsheets work nicely.

Use a representative sample size. Correct Fairness in data collecting is made possible by taking into account inclusive sample groups, social context, and self-reported data. Academic publications, government agency data, and vetted public databases are frequently reliable data sources. Making informed decisions is the goal of the data life cycle; using tools to transform information is the goal of data analysis. The phases that data passes through over its useful life are covered by the data life cycle, whereas data analysis is the process of looking at and understanding data.

Learn more about information here-

https://brainly.com/question/15709585

#SPJ4

the hexadecimal eqquivalent of (80)10 is

Answers

Answer:

128

Explanation:

how is an inventory of activities different from an inventory of objects?

Answers

The inventory of activities different from an inventory of objects because inventory of activities involves a record of business routine activities , while inventory of objects allows identification and recovery of an object.

What is inventory of activities and an inventory of objects

The inventory of activities entail the record of business routine activities, this could be last purchase of supplies.

The inventory of objects  on the other hand is about identification and recovery of an object and with this Inventories are detailed.

Learn more about inventory at;

https://brainly.com/question/25818989

computer languages designed to be used and understood by humans which are close to human languages (e. g., english) are called:

Answers

High-level programming languages, also known as "human-readable" languages, are computer languages designed to be used and understood by humans. Examples of high-level languages include C, C++, Python, Java, and JavaScript.

These languages are close to human languages such as English in terms of syntax, grammar, and vocabulary. They can also be understood by humans without requiring technical knowledge. High-level languages make it easier to create programs and code quickly, as they are closer to human languages than low-level languages.

High-level languages have many advantages over low-level languages. High-level languages are easier to read and write than low-level languages, meaning that coding can be done more quickly. They are also more flexible, allowing for the creation of more complex programs and more intricate code. Additionally, high-level languages are more portable and can run on many different platforms, whereas low-level languages must be compiled for a specific platform.

In conclusion, high-level programming languages are computer languages designed to be used and understood by humans, as they are close to human languages such as English in terms of syntax, grammar, and vocabulary. These languages have many advantages over low-level languages, such as being easier to read and write, more flexible, and more portable.

You can learn more about High-level programming languages at: brainly.com/question/22695184

#SPJ11

Question 1 (5 points) When you are at a job interview, you should use effective communication strategies, like formal language. What is formal language and why do we use it? Formal language helps create the impression that the speaker is an expert on the topic. It suggests to audience members that the speaker's points deserve respectful consideration, and it presents the ideas of the speech in the most polished possible way.. Formal language is archaic and derived from Shakespeare to help us sound fancy in order to ensure that an employer can see that we are versatile Formal language is our ability to speak more than just one language. If we are bilingual, we have a better chance at being hired.​

Answers

This prompt is about formal oanguage and styles of communication. See the explanation below.

What is formal language and why do we use it ?

Formal language refers to a style of communication that follows specific grammatical and linguistic conventions, typically associated with academic, professional, or formal settings. It is characterized by the use of proper grammar, syntax, and vocabulary, and avoids slang or colloquial expressions.

We use formal language in job interviews to convey professionalism, competence, and respect for the setting and the interviewer. It also helps to convey our ideas in a clear and concise manner, without the distractions of informal language.

Contrary to the notion that formal language is archaic or derived from Shakespeare, it is a contemporary and widely used mode of communication in formal settings. It is not related to bilingualism, which refers to the ability to speak two languages fluently.

Learn more about formal language:
https://brainly.com/question/24222916
#SPJ1

When studying an information system, examples of actual documents should be collected using a process called _____. group of answer choices indexing

Answers

When studying an information system, examples of actual documents should be collected using a process called indexing.

Indexing is the process of tracking and documenting files and folders in a database or file system. The system used to maintain an index is known as an indexing system. In other words, Indexing is the process of systematically collecting, analyzing and organizing documents and other resources that contain information relevant to a specific topic or area of study.

When studying an information system, examples of actual documents should be collected using a process called indexing. The process of indexing is essential when it comes to record-keeping or filing of any information. The objective of indexing is to ensure that the documents are easily accessible and can be retrieved quickly and efficiently when required.

To know more about indexing refer for :

https://brainly.com/question/30531145

#SPJ11

The process of collecting examples of actual documents when studying an information system is called indexing.

Indexing refers to the systematic organization and categorization of documents based on specific criteria or metadata. It involves creating a structured index or catalog that allows for easy retrieval and reference of relevant documents during the study of an information system.

During the indexing process, various attributes of the documents are identified and recorded, such as document title, author, date of creation, file format, and keywords. These attributes serve as indexing terms that help classify and organize the documents in a logical manner.

By collecting and indexing actual documents, researchers and analysts gain access to real-world examples that provide valuable insights into the functioning and characteristics of the information system under study. These documents can include user manuals, system specifications, design documents, project plans, reports, and any other relevant artifacts.

In conclusion, indexing is the process of collecting and organizing actual documents, allowing researchers to analyze and understand an information system more effectively by studying real-world examples

To know more about information system ,visit:
https://brainly.com/question/30586095
#SPJ11

What is output? c = 1 sum = 0 while (c < 10): c = c + 3 sum = sum + c print (sum)

Answers

Answer:

21

Explanation:

The values of c that make it into the loop are 1, 4, 7.

The values that are added to sum are 3 higher, i.e., 4,7 and 10.

The sum of those is 21.

p.s. why did you not run the program yourself?

URL filtering, which uses software to block connections to inappropriate websites, is a type of _________ technology.

Answers

URL filtering, which uses software to block connections to inappropriate websites, is a type of Content Filtering technology.

What is Content Filtering technology?

Content Filtering technology is a type of software that controls access to specific types of online content, such as websites, web pages, and multimedia files. URL filtering is a specific type of content filtering that focuses on filtering Internet traffic based on the web address (URL) of the content being accessed.

Therefore, URL filtering software works by maintaining a database of URLs that are deemed inappropriate or harmful, such as websites containing malicious software, adult content, or copyrighted material.

Learn more about filtering at:

https://brainly.com/question/14795412

#SPJ1

Edhesive 4.6 lesson practice

Range is an example of a_______.

Answers

Answer:

Range is a example of a function

Answer: Function

Explanation: if you ever have trouble go look at the slide show for each presentation and theres your answer

Please help me!!!

Use searching laterally to find more out about obesitymyths.com and if it is credible. Share your findings here.

Answers

Explanation:

I am verry bad at computer science. ...........

Using the search tool, it is discovered that the website is not a credible website.

Why is the website not credible?

This is due to the fact that the domain of the website has been put up for sale. The website does not contain information about what its name suggests.

There is a transfer of ownership waiting to happen. Hence we can conclude that it is not a credible website.

Read more on websites here: https://brainly.com/question/1382377

#SPJ2

A computer system consists uses usernames with 6 symbols, where the allowable symbols are capital letters (A, B, . . ., Z) and digits (0, 1, . . . , 9). Don’t multiply out. Leave your answers in a form like 7! × 53 × 2.
(a) How many usernames are possible if repetition is not allowed?
(b) How many usernames allow repetition and use only letters?
(c) How many usernames are possible if the first three symbols must be different capital letters (i.e., no repeats), the last symbol must be a nonzero digit, and there are no other restrictions on the symbols?

Answers

The possible usernames if repetition is not allowed is 36⁶.

The usernames that allow repetition is 26⁶

The usernames possible if the first three symbols must be different is 15,600.

How to find possibilities?

(a) There are 36 possible symbols for each of the 6 symbols, so there are 36⁶ possible usernames.

(b) There are 26 possible letters for each of the 6 symbols, so there are 26⁶ possible usernames.

(c) There are 26 possible letters for the first symbol, 25 possible letters for the second symbol, and 24 possible letters for the third symbol. There are 10 possible digits for the last symbol. So there are 26 × 25 × 24 × 10 = 15,600 possible usernames.

The first three symbols must be different capital letters. There are 26 possible capital letters for the first symbol, 25 possible capital letters for the second symbol, and 24 possible capital letters for the third symbol. So there are 26 × 25 × 24 possible combinations for the first three symbols.

The last symbol must be a nonzero digit. There are 10 possible digits for the last symbol. So there are 26 × 25 × 24 × 10 possible usernames.

Find out more on computer system here: https://brainly.com/question/30146762

#SPJ4

What is Chicago style citation generator?

Answers

A piece of software called the Chicago Citation Generator creates citations & bibliographies inside the Chicago citation style automatically.

What is software and examples?

The device's running programs, scripts, or applications are generally referred to as "software" in this context. It can be likened to the variable component of a computer, meanwhile the invariable element is the hardware. Application system and software software are the two main subcategories of software.

What are the 2 main types of software?

System and application software are the two main categories into whatever software program is typically divided. Systems software includes programs that simplify application programming as manage a computer system's resources.

To know more about software visit:

brainly.com/question/1022352

#SPJ4

What are the two most common request methods that a security professional will encounter?

Answers

While GET and POST are by far the most common methods that are used to access information provided by a web server, there are a variety of other methods that may also be supported, and can sometimes be exploited by attackers.

What is a conditional? When does one need to use one? Give an example using pseudo-code

Answers

Conditionals are expressions that evaluate to either true or false. They are mostly used to determine Program Flow through if statements and while loops.
Other Questions
Critically discuss the theme of love versus self-interest as portrayed by one or two main characters of Macbeth. Your response should take the form of a well-constructed essay of 350 - 400 -25+t/z greater these or =to 50 Which of the following did not cause a shift in population to the suburbs?-automobiles-crowded conditions in cities-the need for labor in factories-the G.I. Bill island, also known as rapa nui, is one of the most isolated places on earth, located about 1,200 mi (1,931 km) from its nearest neighbor. You put a very hard gumball in your pocket. When you pull it out it isn't hard anymore, but soft like playdough. It has (select all that are true): Passed its melting temperature Had its crystalline regions melt Increased its specific volume Passed its glass transition temperature who knows why we have white blood cells? HELP I NEED HELP ASAP Non-medical use of prescription medications is safer than use of illicit drugs. In PQR, PQ = 17.4 m and PR = 7.6 m. K lies on QR such that PKQ = 137 . find (i) QPR (ii) the length of QKusing the trigonometric ratios How do I solve this ? Which equation represents a line which is perpendicular to the line 4x + 3y = 24? V Oy= x - 4 Submit Answer y = // 2 1 4 x 5 Solve the following system:4x+3y=-2 and 6y=-4-8x A property sells for $25,000, and the dwelling built thereon is only valued at $1,000. What does Section 5.008 of the Texas Property Code say about this situation?it does not require the seller to provide a written notice of the property's condition. The notice is not required for transactions of real property where the value of any dwelling does not exceed 5% of the value of the property. Which graph represents a proportional relationship? When the two most important planets align in the day, then truly the night will point the way the gradual changes that occur in all persons as they age is called _____ aging. The circumference of a circle is 9 m. What is the area, in square meters? Express your answer in terms of Think about what you learned about the spread of new ideas and religions that were brought to the Americas. If y = 3, which of the following expressions willproduce a value of 15?A.5yB.25-10yC.4y+3D.8y divide by 2 Lesson 3: The Iliad (A)1. Describe two things you learned about Paris? (Write 1 full sentence per item in your own words.)Thing 1: Thing 2: 2. Describe two things you learned about Helen? (Write 1 full sentence per item in your own words.)Thing 1: Thing 2: 3. Describe two things you learned about Odysseus? (Write 1 full sentence per item in your own words.)Thing 1: Thing 2: 4. Describe two things you learned about Achilles? (Write 1 full sentence per item in your own words.)Thing 1: Thing 2: