Type two statements. The first reads user input into person_name. The second reads user input into person_age. Use the int() function to convert person_age into an integer.

Answers

Answer 1

Answer:

brainliest

Explanation:


Related Questions

What device is used to perform a loopback testing on a NIC

Answers

Answer:

A loopback cable is also known as loopback plug or loopback adapter, which is a plug used to test physical ports to identify network issue. It provides system test engineers a simple but effective way of testing the transmission capability and receiver sensitivity of network equipment. In a word, it is a connection device that is plugged into a port to perform a loopback test.

Explanation:

Mark me as brainliest please

You are setting up a home network for your friend. She has students visiting her home regularly for lessons and wants to provide Internet access for their parents while they are waiting on the children. However, she is concerned about keeping her own data private at home network. What wireless feature can you configure on her AP (Access Point) to meet her requirement?

Answers

Answer:

A guest network

Explanation:

Four differences between general and special purpose conputer in points.......
( don't spam please )​

Answers

Explanation:

hope this helps to uhh...

list of functions of control unit​

Answers

Answer:

I guess it would help you

1. Who was the first lady programmer?​

Answers

Answer:

ada Augusta Bryon

Explanation:

that is the answer

Answer:

lady Ada lovelace

Explanation:

This is the real answer

what are the functions of super computer?

Answers

Answer:

Supercomputers play an important role in the field of computational science, and are used for a wide range of computationally intensive tasks in various fields, including quantum mechanics, weather forecasting, climate research, oil and gas exploration, molecular modeling .

Explanation:

Hope it helps you

Answer:

Supercomputers play an important role in the field of computational science, and are used for a wide range of computationally intensive tasks in various fields, including quantum mechanics, weather forecasting, climate research, oil and gas exploration, molecular modelling, etc.

Which of the following animation is not common to both slide transition and
custom animation?


Answers

Answer:

slide transition pls mark me branilest

How do you keep a class running after you use a class function once in Python 3.​

Answers

Answer: Primitive data structures—like numbers, strings, and lists—are designed to represent simple pieces of information, such as the cost of an apple, the name of a poem, or your favorite colors, respectively. What if you want to represent something more complex?

For example, let’s say you want to track employees in an organization. You need to store some basic information about each employee, such as their name, age, position, and the year they started working.

If the system continuously reboots, what is most likely the problem?

Overheated CPU
Power Failure
Failed Hard Drive
Application Error

Answers

Aswer

overheated CPU

Explanation:

If the system is randomly shutting down or rebooting, the most likely cause is a heat problem. ·

Write a research about the 5 major of computer applications

Answers

Answer:

At the Indian National Congress Karachi session in 1931, Congress passed resolution dissociating itself and disapproving the policy of political violence in any form. The resolution was drafted by Mahatma Gandhi which admired the bravery and sacrifice of the 3 Martyrs- Bhagat Singh, Sukhdev, and Rajguru.

Explanation:

Which requires large computer memory?

Answers

Answer:

Imaging , Graphics and voice..... requires large computer memory.

Explanation:

1. Explain all the types of computer virus​

Answers

Answer:

1.File infecting virus

A virus that attached itself to an executable program. It is also called a parasitic virus which typically infects files with .exe or .com extensions. Some file infectors can overwrite host files and others can damage your hard drive’s formatting.

2. Macro Virus

This type of virus is commonly found in programs such as Microsoft Word or Excel. These viruses are usually stored as part of a document and can spread when the files are transmitted to other computers, often through email attachments.

3. Browser Hijacker

This virus targets and alters your browser setting. It is often called a browser redirect virus because it redirects your browser to other malicious websites that you don’t have any intention of visiting. This virus can pose other threats such as changing the default home page of your browser.

4. Web Scripting Virus

A very sneaky virus that targets popular websites. What this virus does is overwrite code on a website and insert links that can install malicious software on your device. Web scripting viruses can steal your cookies and use the information to post on your behalf on the infected website.

5. Boot Sector Virus

These viruses are once common back when computers are booted from floppy disks. Today, these viruses are found distributed in forms of physical media such as external hard drives or USB. If the computer is infected with a boot sector virus, it automatically loads into the memory enabling control of your computer.

6. Polymorphic Virus

This virus has the capability to evade anti-virus programs since it can change codes every time an infected file is performed.

7. Resident Virus

A resident virus stores itself on your computer’s memory which allows it to infect files on your computer. This virus can interfere with your operating system leading to file and program corruption.

8. Multipartite Virus

A type of virus that is very infectious and can easily spread on your computer system. It can infect multiple parts of a system including memory, files, and boot sector which makes it difficult to contain.

Explanation:

hope its help

thank you

Is Lt possible to map the way of human thinking to artificial intelligence components

Answers

Answer:

The technique is mind mapping and involves visual representation of ideas and information which makes it easier to remember and memorize facts even in complex subjects. Here is an example of a mind map with the essential elements of AI and the industries where Artificial Intelligence is applied.

Explanation:

Other Questions
pls help its due in 20 minutes solve by using PEMDAS Perform the indicated operation.(7x + 2x2 - 6x - 4) - (2x+3x2 - 3x + 11)(7x + 2x2 - 5x - 4) - (2x + 3x 3x + 11) =(Simplify your answer. Do not factor.) Which option is a negatively charged ion?(1 point)chloratechloridechloritechlorine Help help help help me pls !,!,!, Which of these products are considered hazmat? Please choose all that apply. A) A cell phone containing a lithium-ion battery B) A teddy bear C) A bottle of perfume D) A phone charger Identify 1 food chain that is a part of this food web. Your chain should include both the organism's name and arrows to depict what is prey upon by whom. Please help quickly as possible Thank you! ILL MARK BRAINIEST IF YOU CAN DO THIS CORRECTLY!!! what is f(x) = x2 + 4x in standard form I need answer pls help If a diver displace water with a weight of 500N what is the upthrust on the diver? What is the value of the expression 6( -5 1/4 ? Add 1.25+2.5Plot the addend on the number lineI need the answers to 1.04 adding decimals.1. -1.25+ 2.5 plot the addend number on the number line2. What is the suffix of encoded?-edencodeen-codedcode What impact does the word pioneering have on the readers understanding of events in the passage?Choose 1 answer:(Choice A)It helps the reader understand why Lovelace chose to study math and not poetry.(Choice B)It helps the reader connect Lovelaces work to Babbages work.(Choice C)It helps the reader understand Lovelaces significance to the world of math and computers.(Choice D)It helps the reader connect the events from Lovelaces early life to her later life. true or false An insurance broker is the best person to advise you on the type of insurance you need. Mabel needs to order 8,742 binder clips for an upcoming conference. If the binder clips come in boxes of 47, how many boxes should Mabel order? What was the relationship between the political structure of Jamestown and the king of England ?: 11. How many children did Anne Bradstreet have in her life? Evaluate each expression.