Write a python script that asks the user to input an integer

Assignment Help Management Information Sys
Reference no: EM132244356

Question :

Write a Python script that asks the user to input an integer and then a character. Use those values to print the character in the following pattern: (include the -'s in your output)

r r r r r

r r r r

r r r

r r

r

- - - - -

r

r r

r r r

r r r r

r r r r r

The entry for this output was the integer 5 and the letter r. Your output could use any integer or letter to print this pattern.

Notice there is a line of dashes between the two patterns, this should be included in your code.

Reference no: EM132244356

Questions Cloud

How has webcor used technology to support project : How has Webcor used technology to support project management in the construction field?
Develop a term project paper of an implementation plan : Develop a Term Project Paper that is a detailed design of an implementation plan to incorporate RFID technology as part of a real-world business model.
List two ways you would motivate each individual : Create a detailed written recommendation explaining the approach that Mike should take to orient himself with his new team.
Review a case on Criminal Law : Please review a case in Chapter Five on Criminal Law. A summary of the facts. Issue or problem the court is being asked to address
Write a python script that asks the user to input an integer : Write a Python script that asks the user to input an integer and then a character.
Develop a script containing three new methods : Add a method to the Turtle class to draw a simple house. It can have a rectangle for the house and an equilateral triangle as the roof.
Explain the application of project management principles : Competitive advantage implies the creation of a system that has a unique advantage over competitors. With the advent of globalization, the competition.
What vulnerability could be exploited : Identify two threat sources, one adversarial and one non-adversarial, that could exploit a vulnerability to your workplace or your school that would result.
What vulnerability could be exploited : Identify two threat sources, one adversarial and one non-adversarial, that could exploit a vulnerability to your workplace or your school that would result.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Make a simple research proposal-

Make a simple research proposal related to the essay provided above and outlining the main stages which is: Stage 1: Clarifying the research question, Stage 2: Proposing research and Stage 3: Designing the research

  In which poor cybersecurity policy can disrupt continuity

Analyze the overall manner in which poor cybersecurity policy can disrupt business continuity. Provide at least two examples of such disruption to support your response.

  Discuss the rfid standards which apply to your industry

If there are no specific standards that you think apply to your selected industry then research how an existing RFID standard could be modified to support .

  Identify all it assets and enter a description

Indicate if the asset accesses customer privacy data or contains customer privacy data.Classify the IT asset as Critical, Major, or Minor.

  Does the firm have any opportunity to express its opinion

If the United States Supreme Court has decided a similar case, would that decision be binding on the Illinois court?

  Advantages and disadvantages of the patient entering

What would be the advantages and disadvantages of the patient entering vs. a health care professional in just the history portion of the EHR

  List and explain five typical firewall guidelines

List and explain five typical firewall guidelines or practices. Select two of the best practices that you feel are more important than the others.

  Describe the usability properties of interactive systems

Describe the usability properties of interactive systems.Use technology and information resources to research issues in human-computer interaction.

  Why cyber security exists and how it benefits the society

Why cyber security exists and how it benefits the society, describe operational risks and their sources. Describe product liability and the role of the government in acquisition and procurement of cyber security products and services.

  Describe the main elements of an acceptable use policy

Determine the factors that organizations need to consider when developing their acceptable use policy.

  Describe the golden rules of interface design

Suggest two (2) changes for each interface to achieve a more user-friendly design and justify your suggestion.

  Analyses of health trends and social determinants of health

Provide a brief narrative analysis of your conclusions. Were trends evident? Why or why not? Are these data sufficient to draw a conclusion

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd