4.10.4 Inventory codehs python
i have no idea on how tp fix this, pls help:(

4.10.4 Inventory Codehs Pythoni Have No Idea On How Tp Fix This, Pls Help:(
4.10.4 Inventory Codehs Pythoni Have No Idea On How Tp Fix This, Pls Help:(

Answers

Answer 1

Answer:

between line 23 and 24, add:

    if num > 0:

(and indent the next line)

Explanation:

You want to suppress the "Now we have 0 left" message, and an additional if statement will do that for you.

Answer 2

In this exercise we want to use computer and python knowledge to write the code correctly, so it is necessary to add the following to the informed code:

  if num > 0:

Want to suppress the "Now we have 0 left" message, and an additional so for that is necessary to put between line 23 and 24, the code:

   if num > 0:

See more about computer at brainly.com/question/950632


Related Questions

??????????????????? Help

Answers

ms office is a software, that would make the most sense.

Answer:

d) MS Office

Explanation:

Microsoft Office is a program. Think of it this way .... Your operating system is like the engine of your car.

in database systems, a table is also known as a _____.

Answers

Answer:

a relation

Explanation:

In database systems, a table is also known as a file.

What do you mean by database systems?

A database is a structured collection of data that is stored and retrieved electronically in computing. Small databases can be kept on a file system, whereas large databases are kept on computer clusters or in the cloud. Database design encompasses both formal techniques and practical factors, such as data modelling, efficient data representation and storage, query languages, sensitive data protection and privacy, and distributed computing issues such as concurrent access and fault tolerance. To gather and analyse data, a database management system (DBMS) is the software that communicates with the end users, applications, as well as the database itself.

One of the various types of the system object type *FILE is a database file. A database file provides specifications of how input data from internal storage is to be presented to a programme and how output data from a programme is to be presented to internal storage.

To learn more about database systems
https://brainly.com/question/28481695

#SPJ2

Explain what is Piaget and What is Cooperative problem solving.

Answers

Piaget maintained that opportunities for becoming less egocentric are more common when children discuss things with each other because then they must face the fact that not everyone has the same perspective on a situation.

hope it helps

Mavis is considering signing up for a hosted enterprise software solution for her small business. She recognizes that an advantage of this software option is _____.

Answers

Since Mavis is considering signing up for a hosted enterprise software solution for her small business, an advantage of the software is lower cost.

A hosted enterprise software solution is typically hosted off-site and in a private server that is owned by a third party. It's vital for organizations as it can be used in managing daily business activities.

The advantages of a hosted software model include reliable backup, reduction in IT costs, scalability of computing resources, etc. It is also necessary for managing critical business processes.

Read related link on:

https://brainly.com/question/25526416

Can you predict what changes will come to data storage in the next decade? 

Answers

Answer:

Explanation:

More data storage will become available currently there are kilobytes (KB), megabytes (MB), gigabytes (GB) and terabytes (1TB) of storage but in the future maybe there will be tetrabytes

You need to replace the motherboard on a laptop. Which two items should you disconnect or remove first

Answers

Your motherboard should now be freely floating in your case—pull it out. With the old motherboard free, you'll need to remove its CPU cooler, CPU, and RAM so you can install it into your new motherboard.

principles of Responsible Artificial Intelligence (AI)?

Answers

Answer:

Their principles underscore fairness, transparency and explainability, human-centeredness, and privacy and security.

Explanation:

To break a text string into several lines, which means that the text string continues on the next line, the _____ character should be used.

Answers

Answer:

To break a text string into several lines, which means that the text string continues on the next line, the backslash character should be used.

What type of access controls allow the owner of a file to grant other users access to it using an access control list

Answers

Answer:

Discretionary Access Control

Explanation:

The type of access controls allow the owner of a file to grant other users access to it using an access control list is Discretionary Access control.

What is discretionary access control?

This is known to be a type of control that gives one a specific amount of access control to the use of the object's owner, or any other person.

Note that The type of access controls allow the owner of a file to grant other users access to it using an access control list is Discretionary Access control as it only gives a little access.

Learn more about Discretionary Access from

https://brainly.com/question/20038736

#SPJ2

Is it always best for a company to make decisions based on data, or are there some situations where they should not focus on data?

Answers

Answer:

data-driven decision

Explanation:

While 91% of companies say that data-driven decision-making is important to the growth of their business, only 57% of companies said that they base their business decisions on their data. Data-driven decision-making is a great way to gain a competitive advantage, increase profits and reduce costs!

Printers can use ________, which enable the printer to automatically print on both sides of the paper.

Answers

Answer:

Duplex

Explanation:

Changing printer setup to print duplex will enable the printer to automatically print on both sides of the paper.

What kind is a utility file that shrinks the size of a file

Answers

Answer: Compression

Explanation:

test case Exercise 1: Consider the following system: A System reads four integer values from a user. The four values are interpreted as representing the lengths of the sides of quadrilateral shape. The system prints a message that states whether the shape is rectangle or square. Function: Description: Test Input Data:

Answers

The program displays if the side values of the quadrilateral is a square or rectangle. The required program is written in python 3 thus :

a = int(input('Enter integer input : '))

b = int(input('Enter integer input : '))

c = int(input('Enter integer input : '))

d = int(input('Enter integer input : '))

#the variables a, b, c, d takes prompt values from users which are used to compare if the quadrilateral is a square or rectangle.

if(a == b == c == d):

#using the assignment operator, compare the value of a, b, c and d

print('Shape is square')

#if the values are the same, the shape is a square

else :

print('Shape is Rectangle')

#otherwise, the shape is a rectangle

The sample run of the program is attached below.

Learn more : https://brainly.com/question/18405415

A file contains 5000 bytes. Calculate the size of the file in kilobytes.
Your answer must be to one decimal place

You should show your working.

Answers

Answer:

5 Kilobytes

Explanation:

5000 bytes ÷ 1000 = 5 kilobytes

PLEASE HELP! WILL MARK AS BRAINLIEST JavaScript can be implemented using the _________ HTML tags in a web page.​

Answers

Answer:

JavaScript can be implemented using JavaScript statements that are placed within the ...  HTML tag

Explanation:

Answer : language

JavaScript is a scripting language, not a HTMLanguage type. It is mainly to do process at background and it needs document.

Does anyone know who this man issss?

Answers

Kaeya Should be the correct answer

Emilie is reviewing a log file of a new firewall. She notes that the log indicates packets are being dropped for incoming packets for which the internal endpoint did not initially create the request. What kind of firewall is this

Answers

Firewalls are used to screen and avoid block the threat posed by unwanted data or files that could want to penetrate into a system. Hence, the kind of firewall described is packet filtering firewall.

Packet filtering firewall describes a network security protocol which examines individual data packets entering into a system.

Each data packet is screened based on established principles and protocols, with only those who meet the defined requirement allowed to reach their destination while others are dropped.

Hence, the missing phrase is packet filtering firewall.

Learn more : https://brainly.com/question/25706522

DIRECTIONS: Organize your desktop. Name the 5 folders based on the files given below. Organize your own desktop by sorting the given files accordingly.

Please
I need help​

Answers

Answer: Music, Documents, PowerPoints, Pictures/Videos, Audios

Samantha wants to begin searching for a job using the Web. The best source for her online search will probably be __________.

Answers

Answer:

C) A company's website

Explanation:

cats do not eat tomatoes.scat is a cat.therefore ,scat does not eat tomatoes.

Answers

What does this mean??

CODEHS 3.5.4 Obi-Wan Says



You should ask the user for three pieces of information

You should confirm their name and how many droids and Wookiees they want to meet

You should confirm their name and how many droids and Wookiees they want to meet

Answers

The program receives inputs for the name, number of droids and wookiees a user wants and displays the information as a complete sentence. The program written in python 3 goes thus :

name = input('Enter name : ')

# prompts user of name

num_droid = int(input('number of droids : '))

#prompts for number of droids

num_wooks = int(input('number of wookiees : '))

#prompts for number of wookiees

print(name, ' wants to meet', num_droid, 'droids and',num_wooks , 'Wookiees' )

#displays the information as a complete sentence

A sample run of the program is attached

Learn more : https://brainly.com/question/25506437

There's a tool designed to collect data. It allows you to specify which counters you want to collect data for by clicking on the plus sign and adding the counters you want. What's the name of this tool

Answers

Answer:

social engineering is a way to collect data

Explanation:

Read only memory is primarily used for?

Answers

Answer:

Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware. Software applications (like video games) for programmable devices can be distributed as plug-in cartridges containing ROM.

Hope This Helps!!!

You have been asked to store a file with personal information on it. You need to be sure that only your user account can access the file, even if other user account have been granted permissions or if the disk is stolen. What standard NTFS feature can you use

Answers

Answer:

EFS

Explanation:

what command can be used to repair a dual boot system?

Answers

Answer:

bootrec utility

Explanation:

It entirely depends on your version of windows and if you are even on windows, so I have no explanation, but for windows it is possible.

Question about microscope ​

Answers

Answer:

1.  c. diaphragm

2.  a. ocular lens

3.  b. fine adjustment knob

4.  c. course adjustment knob

5.  d. nosepiece

6.  a. simple light microscope

7.  d. A, B, and C

8.  a. light switch

Explanation:

Hope this helps.

explain about cyber terrorism​

Answers

Explanation:

cyber terrorism is type of hacking group with give the country that are to illegal group

if you are continuously working with the same range, then you may give a name to the range using _____ option in the data menu open office.
a define data.
b define range.
c define reference.
d define addres​

Answers

Answer : B. Define Range

If you are continuously working with the same range, then you may give a name to the range using define range option in the data menu open office. The correct option is b.

What is a range?

In computer programming, range refers to the interval that includes the upper and lower bounds of an array's variable values. The interval between data points is referred to as the range in statistics.

The domain of a function is the set of values that can be plugged into it. This set contains the x values in a function like f. (x).

A function's range is the collection of values that the feature can take. This is the set of values that the function returns after we enter an x value.

If you are constantly working with the same range, you can give it a name by selecting the define range option from the data menu in Open Office.

Thus, the correct option is b.

For more details regarding range, visit:

https://brainly.com/question/28135761

#SPJ6

To break a page click the _______ tab​

Answers

Answer: Page Break (or press ctrl + enter on keyboard)

Explanation:

1) The critical path of a network is the A) shortest time path through the network. B) path with the fewest activities. C) path with the most activities. D) longest time path through the network. E) None of the above

Answers

Answer:

D

Explanation:

source

https://hbr.org/1963/09/the-abcs-of-the-critical-path-method

Other Questions
Safety belts usually consist of a lap belt and __________ Commonlit: How does Tiresias's prophecy affect the plot of the storyA. Tiresias predicts that Narcissus will drown so his mother Liriope kept him from rivers and springs.B. Tiresias predicts that Narcissus shall be beautiful but cursed by a spurned lover, and so his mother Liriope instructs him to reject all potential lovers.C. Tiresias predicts that Narcissus shall die if he sees his reflection; embittered, Narcissus scorns all lovers because they only talk of his beauty, which he cannot see.D. Tiresias predicts that Narcissus will live a long life as long as he does not see his reflection; when he does, it leads to his tragic end. In an experiment, the temperature of a sample is measured as 16 degrees Celsius.If the percent error is 0.75%, how can you report the temperature of the sample using the absolute error and the actual temperature value in degrees Celsius?-160.12-1612-160.047-164.7 Apply the Triangle Sum Theorem to find the sum of the angles in the pentagon. A pentagon can be divided into three triangles. Aliyah went to the sandwich shop for lunch. She had a sandwich and a salad. Her total bill for lunch was $9.82. The salad she ordered cost $2.56. Which correctly shows how she determined the cost of her sandwich? Find the missing number in the following series: __ 85 81 83 79 81 77 plsss answer my questionits in the picture How did the population of the colonists change over time Using the formula find the slope of a line with these two points (2,10) and (5,15). Which sentence uses the word volcano or volcanoes as figurative language? The freshman class learned today that not all volcanoes erupt violently. The freshmen will have their volcanoes for science with them today. The situation with the freshman is like a volcano threatening to erupt. The situation with the freshman volcano project has been resolved. A kitchen has a water supply, an electricity supply and electric lighting there are several electrical appliances in the kitchen including a toaster, akettle a clothes iron, a microwave oven and a dishwasher discuss three hazards of using electricity in this kitchen ? 3. What are some similarities today that were going on in the 1950s? I WILL MARK BRAINLEST HELP Mary has a mass of 40 kg and sprints at 1 m/s. How much kinetic energy does she have? She has a kinetic energy of 20 J.Roberto has twice the mass his sister Mary has (see above) but runs at the same velocity as Mary.Will his kinetic energy be twice as much? Show your work. Why do the hydrogen ions and the hydroxide ions form bonds to make macromolecules?Pick One of the Following:A. They both have protons that attract to each other. B. They each have an electrical charge that attracts to each other.C. They both have electrons that attract to each other. At a coffee shop, a latte costs $5.50 andhot tea costs $1.75. Each day, Parkerbuys 2 hot teas and several lattes forhis office staff. Which equation can beused to find y, Parker's total cost, if xrepresents the number of lattes? (7.1A,7.1B, 7.1D, 7.1F)A y = 5.50x + 3.50BY 5.50x + 1.75C y = 1.75x + 5.50Dy = 3.50x + 5.50 Annual Percentage Rate (APR), credit limit, and penalties and fees are important to consider when _____. help me please need this right now In what ways does dehumanization play a role in this reading? Explain and give an example from the readingthe link will be in the comments A new disease has recently been discovered in a village, and you have been brought in to investigate. The disease appears to pass from one person to another when they shake hands, and it can be cured with antibiotics. What can you say about this disease?. Shawn has 325 dollars if shawn uses only hundreds tens and ones write the number of each kind of bill that shawn has NEEDS TO BE ANSWERED ASAP