i am doing 7th grade coding 3.02 assignment can anybody help me it says bad input on line 3 and this is what it is can someone help me
grade = int(input("What grade are you in?"))

Answers

Answer 1

Answer:

grade = int(input("What grade are you in?")

if grade == 9:

print ("Freshman")

elif grade == 10:

print ("Sophomore")

elif grade == 11:

print ("Junior")

elif grade == 12:

print ("Senior")

else:

print ("Invalid")

Explanation:

You fail to provide the complete code. So, I will rewrite the code from scratch

The complete question requires that the level is printed based on the input grade.

The code has been added in the answer section.

The explanation is as follows:

[Thus gets input for grade]

grade = int(input("What grade are you in?")

[If grade is 9, this prints Freshman]

if grade == 9:

print ("Freshman")

[If grade is 10, then level is sophomore]

elif grade == 10:

print ("Sophomore")

[If grade is 11, then grade is Junior]

elif grade == 11:

print ("Junior")

[If grade is 12, then level is senior]

elif grade == 12:

print ("Senior")

[All other inputs are invalid]

else:

print ("Invalid")


Related Questions

open accomplishing your task I was able to​

Answers

Answer:

WTH KINDA QUESTION IS THIS !

I DON'T UNDERSTAND DUDE

Determine whether the phrase below is a sentence or a fragment.

While we were in Greece, we ate a lot of feta cheese.
a.
Sentence
b.
Fragment

Answers

sentence.


i believe it is sentence

True or False? Using your traffic analytics report, you can see the source of traffic to your website

Answers

Answer:

True

Explanation:

Which area of a magazine cover is often important for those shops and stalls that cannot display the entire cover page on a stand?
A.
one-third
B.
left-third
C.
two-third
D.
one-fourth

Answers

I think the answer is one fourth.

Because usually only that part is visible in a stand. It usually contains the name of the magazine and a little bit of illustration gives an idea about what it is about.

application software can run without the presence of system software true or false ​

Answers

Answer:

false

...........

.....

Eva is the network architect for her company's large cloud deployment; she has interconnected her private cloud to a community cloud in another province. She is investigating using the community cloud to supplement her private cloud workload during end-of-month processing. What operation is she going to perform

Answers

Answer:

The appropriate response is "Cloud bursting".

Explanation:

A strategy for the implementation of a program in a proprietary cloud or network infrastructure that explodes onto a public cloud if availability or production for computational power increases, could be considered Cloud bursting.It enables extra cloud capabilities throughout cases where additional facilities have been required.

Which type of attack cripples the network and prevents legitimate users from accessing network resources

Answers

Answer:

A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack made to take down the targeted website or slow it down by flooding the network, server or application with fake traffic. When against a vulnerable resource-intensive endpoint, even a tiny amount of traffic is enough for the attack to succeed.

Distributed Denial of Service (DDoS) attacks are threats that website owners must familiarize themselves with as they are a critical piece of the security landscape. Navigating the various types of DDoS attacks can be challenging and time consuming. To help you understand what a DDoS attack is and how to prevent it, we have written the following guidelines.

1

What is a DDoS attack?

1.1 – Understanding a DDoS Attack

The objective of a DDoS attack is to prevent legitimate users from accessing your website. For a DDoS attack to be successful, the attacker needs to send more requests than the victim server can handle. Another way successful attacks occur is when the attacker sends bogus requests.

1.2 – What is the Goal Behind a DDoS Attack?

The main goal of an attacker that is leveraging a Denial of Service (DoS) attack method is to disrupt a website availability:

The website can become slow to respond to legitimate requests.

The website can be disabled entirely, making it impossible for legitimate users to access it.

What is the reporting library? A resource that offers dozens of canned reports built around marketing best practices A reporting add-on feature you can buy for an additional $300 a month Dozens of canned reports that help you dig a little deeper into your data — only currently available to HubSpot Admins The section of your public library where HubSpot developers sit when creating the HubSpot reporting tools

Answers

Answer:

A resource that offers dozens of canned reports built around marketing best practices

Explanation:

Report library is a resource within HubSpot that stores reports in standard formats which a user can save to her or his list of reports and which can also be added to the users dashboards.

The topics handled by each report are based on best practices, including sales metrics, and the performance of websites, and there are dozens of reports within the library to choose from

Therefore, the reporting library is a resource that offers dozens of canned reports built around marketing best practices

write a pseudocode that reads temperature for each day in a week, in degree celcius, converts the celcious into fahrenheit and then calculate the average weekly temperatures. the program should output the calculated average in degrees fahrenheit

Answers

Answer:

total = 0

for i = 1 to 7

input temp

temp = temp * 1.8 + 32

total + = temp

average = total/7

print average

Explanation:

[Initialize total to 0]

total = 0

[Iterate from 1 to 7]

for i = 1 to 7

[Get input for temperature]

input temp

[Convert to degree Fahrenheit]

temp = temp * 1.8 + 32

[Calculate total]

total + = temp

[Calculate average]

average = total/7

[Print average]

print average

Computer designers have concentrated on technology using gallium arsenide instead of silicon because silicon:

Answers

Answer: cannot emit light and has speed limitations

Explanation:

Silicon is usually used in computer chips and solar cells but Gallium arsenide is regarded as a better alternative even though it's costly than silicon.

Gallium arsenide has technical advantages over silicon as its electrons

move through it faster than they move through silicon. Also, cannot emit light and has speed limitations.

Gallium arsenide is used in manufacturing devices like infrared light-emitting diodes, solar cells, optical windows, etc.

Answer please in order

Answers

Answer:

analogue; discrete; sampled; sample rate; bit depth; bit rate; quality; larger; file size.

Explanation:

Sound are mechanical waves that are highly dependent on matter for their propagation and transmission.

Generally, it travels faster through solids than it does through either liquids or gases.

Sound is a continuously varying, or analogue value. To record sound onto a computer it must be turned into a digital, or discrete variable. To do this, the sound is sampled at regular intervals; the number of times this is done per second is called the sample rate. The quality of the sound depends on the number of bits stored each time - the bit depth. The number of bits stored for each second of sound is the bit rate and is calculated by multiplying these two values (sample rate and bit depth) together - kilobits per seconds (kbps). The higher these values, the better the quality of the sound stored, but also the larger the file size.

18. Which of the following provides the SLOWEST Internet access?
O Ti line
Network
Digital Subscriber line (DSL)
Dial-up

Answers

Answer:

Dial up

Explanation:

Dial-up is by far the slowest of all Internet connections available. Use of dial-up requires a separate phone line, since users must connect via the telephone to their Internet service provider.

The DuPage Freight Shipping Company charges the following rates: Weight of Package Rate per Pound 2 pounds or less $1.10 Over 2 pounds, but not more than 6 pounds $2.20 Over 6 pounds, but not more than 10 pounds $3.70 Over 10 pounds $3.80 Design a program that does the following: asks the user to enter the weight of a package and displays the shipping charges. 1. Prompt the user for the weight of a package 2. Determines the rate per pound in a getRate module 3. Calculates and displays the total shipping charge in a getTotal module Hint - you may want to use a global variable for this! Please submit three things:

Answers

Answer:

The program in Python is as follows:

def getRate(weight):

   if weight<=2.0:

       rate = 1.10

   elif weight>2 and weight<=6:

       rate = 2.20

   elif weight>6 and weight<=10:

       rate = 3.70

   else:

       rate = 3.80

   return rate

def getTotal(weight,rate):

   total = weight * rate

   print("Total: ",total)

weight = float(input("Weight: "))

rate = getRate(weight)

getTotal(weight,rate)

Explanation:

This defines the getRate function

def getRate(weight):

The following if conditions determine the corresponding rate based on the value of weight passed to the function

   if weight<=2.0:

       rate = 1.10

   elif weight>2 and weight<=6:

       rate = 2.20

   elif weight>6 and weight<=10:

       rate = 3.70

   else:

       rate = 3.80

This returns the rate back to the main method

   return rate

The getTotal module begins here

def getTotal(weight,rate):

This calculates the total charges

   total = weight * rate

This prints the calculated total

   print("Total: ",total)

The main begins here

This gets input for weight

weight = float(input("Weight: "))

This gets the rate from the getRate function

rate = getRate(weight)

This passes values to the getTotal function

getTotal(weight,rate)

A) What is the initial configuration BPDU for B4? B) What is the configuration BPDU of B3 after receiving the initial configuration BPDU of B5? C) If B3 accepted B2 as the root, what is the configuration BPDU of B3? D) If B2 accepted B1 as the root through B7, what is the configuration BPDU of B2? E) Which bridge is the designated bridge of LAN C at this time? F) Now, if B5 accepted B1 as the root, what is the configuration BPDU of B3 after receiving the new configuration BPDU of B5? G) Which bridge is the designated bridge of LAN C at this time?

Answers

Answer: b is good

Explanation:

Why does a computer need programs? ​

Answers

To run successfully. That was the answer on my quiz. Sorry if it doesn’t help
The computer is just a platform, the key is what to use it for. This is program

You should avoid having other people in portraits with children. True False

Answers

Answer:

You should avoid having other people in portraits with children.

✓ False

Explanation:

plz help me to do 4 number

Answers

Answer:

A is an abbaccus.  B is Blaze Pascal.  C is The Jacquard Loom.  D is Charles Babbage.  E is The Manchester Baby.

Explanation:

You have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users.Which solution should you use?

Answers

Answer:

Explanation:

In this scenario, the best option is to first create a DMZ. This stands for Demiliatirized Zone and basically allows anything connected to it to access networks that have not been completely verified (which in this case would be the internet). Once the DMZ is created you are going to want to add the web server to the DMZ. This will allow the web server to access the internet and be publicly available to its users. At the same time you are going to want to add the company network behind the DMZ so that it is not allowed to publicly access the internet without the data going through the firewall first. Therefore, protecting the company network users.

what is the term used to describe the situation when a derieved class provides a function already provided in the bae class

Answers

Answer:

The right approach is "Overriding".

Explanation:

The overriding function seems to be a programming application that enables a classroom as well as children to successfully implement some technique that's been given by another one of their parents or super classes.The overriding method must be named, signed, and parameter-like inside your parent process throughout the child one.

Thus the above is the correct answer.

You are moving to an area where DSL will be available in the next six months. Which method of internet connectivity should you implement until DSL is available if your existing connectivity needs are minimal

Answers

Answer:

Answer would be, PSTN (public switched telephone network)

what is computer engineering

Answers

Answer:

Computer Engineering is the discipline embodying science and technology in the design, building, implementing, and maintenance of modern computer systems and computer-controlled equipment software, and hardware components.

Explanation:

Computing engineering is an engineering branch that incorporates several computer sciences and engineering industries that are necessary for the development of computer equipment and software. In general, computer engineers are educated not only in software engineering or electronic engineering but also in software design and software integration. Computer engineers participate in numerous computer software and hardware aspects from the conception of different microcontrollers, micro-producers, personal computers, and supercomputers to the design of circuits.

Computer engineers are usually involved in the writing of software and firmware for embedded microcontrollers, the design of VLSI chips, analog sensors, the construction of mixed-signal systems, and the design of operating systems. The robotic research process is also suitable for the use of digital systems to control and monitor electrical systems, such as drives, communications, and sensors. Computer engineers are also suitable.

In many universities, informatics students are allowed to choose areas of in-depth study in their junior and senior levels, as the full size of knowledge used in computer design and use is beyond the scope of a bachelor's degree. Other institutions may require students to complete one or two years of general engineering before declaring the focus on computer technology

If a vulnerability is not fixed at the root cause, there is a possibility that another route of attack can emerge. This route is known as the ____________________.

Answers

Answer:

attack vector

Explanation:

If a vulnerability is not fixed at the root cause, there is a possibility that another route of attack can emerge. This route is known as the attackvector.

Select all that apply: Our primary objectives in functional programming are: Group of answer choices Functions should be as pure as possible following a pattern of Input->Processing->Output To model algorithms in a state-machine like format Removing state from programming Modeling data into a fact-base to be queried Raising our abstraction towards math Code free of side effects Modeling data into classes/objects that intercommunicate to solve software issues

Answers

Answer:

Functions should be as pure as possible following a pattern of Input->Processing->Output

To model algorithms in a state-machine like format

Code free of side effects

Explanation:

Functional programming is a popular concept in most popular programming languages such as Lisp that makes use of functions in separating code that aims to define and solve a particular problem which is part of a bigger problem. Functional programming focuses on what to solve, ie what is the problem rather than how do we solve it. It divides up code in meaningful blocks that makes it a lot more understandable, allowing big problems to be solved in tiny bits and not an overwhelming whole. Functional programming adopts the state-machine like format as it makes use of input and alters state as necessary(not hard coded). It also removes side effects issues that may be experienced when a function affects or mutates variables(global variables) that may be outside its block.

They have requested a 1- to 2-page memo that describes the hospital's protections against a ransomware attack.

Answers

What is the memo that they have asked of you

write a program to generate following series in qbasics 100,81,64,....1​

Answers

Answer:

[tex]9 \times 9 = 81 \\ 8 \times 8 = 64 \\ 7 \times 7 = 49 \\ 6 \times 6 = 36 [/tex]

it's square root number you multiple times by 2

which one will be the correct answer​
pls tell

Answers

Answer:

option c clean boot. it is correct.

Option c, clean boots is the correct answer

B2B partners often connect to each other on the Internet through special __________ designed to facilitate information exchanges and transactions. search engines web masters web portals web routes gatekeepers

Answers

Answer:

web portals

Explanation:

B2B (business-to-business) is a marketing strategy that deals with meeting the needs of other businesses, by selling products or services to the organizations for resale to other consumers, used in production of goods or for the operation of an organisation.

B2B (business-to-business) model focuses on facilitating sales transactions between businesses.

Under the B2B, the producer sells its products directly to other businesses such as wholesalers or retailers and not the end consumers.

B2B partners often connect to each other on the Internet through special web portals that are designed to facilitate exchange of information and simplified business transactions.

Additionally, a popular application of the seller-side marketplace model, which is a major business-to-business (B2B) e-commerce model, is e-procurement of goods through the use of web portals over the internet and as such eliminating the option of physical buying or procurement.

An item that contains both data and the procedures that read and manipulate it is called a(n) ________.

Answers

Answer:

Object

Explanation:

An item that contains both data and the procedures that read and manipulate it is called an object.

The Curtis Publishing Company's early marketing research efforts mainly had to do with _____. people who drove automobiles people who bought books people who read books people who bought automobiles

Answers

Answer:

people who bought automobiles

Explanation:

Market research can be defined as a strategic technique which typically involves the process of identifying, acquiring and analyzing informations about a business. It involves the use of product test, surveys, questionnaire, focus groups, interviews, etc.

Cyrus H. K. Curtis was a publisher that founded and established the Curtis Publishing Company as a news magazine in 1891.

The Curtis Publishing Company's early marketing research efforts mainly had to do with people who bought automobiles in the United States of America.

Which is the most viewed vdo in YT ever?​

Answers

“Baby Shark Dance” by Pinkfong Kids' Songs & Stories (8.44bn views)
“Despacito” by Luis Fonsi, featuring Daddy Yankee (7.32bn views) ...
“Shape of You” by Ed Sheeran (5.29bn views) ...
“Johny Johny Yes Papa” by LooLoo Kids (5.24bn views) ...
Other Questions
In a raisin in the sun who is Mr. Lindner and what does he want What is the equation of exponential regression equation? Round all numbers you your answer to three decimal places Which expression best estimates 6 and three-fourths divided by 1 and two-thirds?Which expression best estimates 6 and three-fourths divided by 1 and two-thirds? Cars arrive at an automatic car wash system every 10 minutes on average. The cars inter-arrival times are exponentially distributed. Washing time for each is 6 minutes per car and is purely deterministic (i.e., the waiting line system is M/D/c). Assuming that the car wash has a single bay to serve the cars, what is the average number of cars waiting in line (L.)? Which best compares the authors' purposes in Silent Spring and "Save the Redwoods"? When a narrator uses the pronoun I, we know the point of view is ___________. Question 17 options: 1) First person 2) Second Person 3) Third person why Fossil fuel has been used more in the existing world ? Anh/Ch hy chng minh: Hc thuyt hnh thi kinh t - x hi l hn tng ca ch ngha duy vt lch s; cn s vn ng pht trin ca x hi loi ngi tri qua cc hnh thi kinh t - x hi l mt qu trnh lch s - t nhin. Think of one behavior that used to be a considered legal/moral deviance in the past that today is more likely to be seen as a medical condition. Then, answer the following questions:a. What is this behavior?b. Who responded to this behavior (police, community, therapist, teacher...) in the past and who responds to it presently (you might want to do some online research on this if you don't know; just make sure to cite your source)?c. How was this behavior dealt with in the past, and how is it dealt with in the present? A new member of your team is visually impaired. He's having a hard time reading his computer screen. How can you show that you value diversity? a) Suggest the organization may not be a great fit. O b) Tell him to apply for a different job within the organization that does not b) require computer usage. 12 Od Tell him that he might want to schedule an eye exam. c) d) Provide access to technology that can magnify or read what is on the computer screen. Question # 1Fill in the BlankComplete the following sentence. Mobility refers to the ability to _____. The density of toluene (C7H8) is 0.867 and that of thiophene (C4H4S) is 1.065 g/ml. A solution is made by dissolving 10.00g thiophene in 250.00ml of toluene. a)Calculate the molarity of the solution b)Assuming the volume are addictive ,calculate the molarity of the solution Two train 75 km apart approach each other on parallel tracks, each moving at15km/h. A bird flies back and forth between the trains at 20km/h until the trains passeach other. How far does the bird fly? Find the volume of this cone.Use 3 for T.3ft17 ft.V = Tr2h3VV ~ [?]ft?Enteryour answer in decimal form. The Nepalese have the trend of working in foreign countries for long. What might be the benefits and drawbacks of brain drain? Point out three for each. Hi Jane!I've been meaning to write for ages and finally today I'm actually doing something about it. Not that I'm trying to make excuses for myself, it's been really hard to sit down and write, as I've been moving around so much. Since we last saw each other I've unpacked my bags in four different cities.I went from London to Prague to set up a new regional office there. You know I'd always wanted to go, but maybe I was imagining Prague in spring when I used to talk about that. Winter was really hard, with minus 15 degrees in the mornings and dark really early in the evening. But at least it was blue skies and white snow and not days on end of grey skies and rain, like at home.From there I was on another three-month mission to oversee the set-up of the office in New York. Loved, loved, loved New York! It's like being in one big TV show, as everywhere looks just a little bit familiar. I did every tourist thing you can think of when I wasn't working, and must have spent most of my salary on eating out. It was really hard to leave for the next job, especially as I kind of met someone (!) More about Michael later ...So then I was posted to LA, which felt like a whole other country compared with the East Coast. I could definitely get used to that kind of outdoor, beach lifestyle, but I didn't spend as much time getting to know California as I could have because I was flying back to see Michael every other weekend. He came to see me when he could, but his job means he's often working at weekends, so he couldn't make the flight very often. Those three months flew by and then I was off again, to Frankfurt, which is where I am now. And ... so is Michael! He got a month off work and we're trying to work out how we can be in the same place at the same time for a while. We figure the first step in that direction is getting married, which is also why I wanted to write I can't get married without my oldest friend there! The wedding's going to be at home in London in September and I hope you can come!Anyway, tell me all your news and I promise not to leave it so long this time! Lots of love,Kath Question 1: What was the authors purpose(s) in writing this text?Question 2: How was the text organized?Question 3: How do the type/ topic/ ideas from the text relate to things you have been doing?Question 4: If you were Jane, what would you write to reply Kath? what do most elections for local state and federal offices have in common Which diagram best explains changes to the composition of blood in the lungs?to,fco(A)(B)AlveolusBloodAlveolusBloodCapillaryCapillary(C)(D)AlveolusBloodAlveolusBloodCapillaryCapillary Lucia quiere repartir 4/5 litros de leche entre sus dos hijos en partes iguales. Cunto le dar a cada hijo? In the paralleling technique, the central ray strikes the film at whatangle?OA) 90B) 45C) 75OD) 1250