Computers and Technology, 26.11.2019 06:31, rebtav
Three variables , x, y and z, supposedly hold strings of digits, suitable for converting to integers. write code that converts these to integers and print the sum of these three integers. however, if any variable has a value that cannot be converted to an integer, print out, the string "bad value(s) in: " followed by the names of the variables that have bad values (separated by spaces, in alphabetically ascending order).
for example, if the values of x, y and z were respectively "3", "9", "2" then the number 14 would be printed; but if the values were "abc", "15", "boo" then the output would be:
bad value(s) in: x z
this is what i have so far:
try:
print(int(x)+int(y)+int(z))
except valueerror:
if x=valueerror:
print("bad value(s) in: ", x)
elif y=valueerror:
print("bad value(s) in: ", y)
elif z=valueerror:
print("bad value(s) in: ", z)
python3 .
Answers: 2
Computers and Technology, 23.06.2019 03:00, minelly1717
Your business be in google top rank. more the rank more the business leads. for best seo and digital marketing services be confident to contact you can get best seo solutions by assistance experts provide digital marketing, website development, seo expert services and social media internet seo expert services your branding solutions. seo expert services ,best seo expert services, online seo expert services,
Answers: 3
Computers and Technology, 23.06.2019 08:00, ionmjnm3041
The managing director of a company sends a christmas greeting to all his employees through the company email. which type of network does he use? he uses an .
Answers: 3
Computers and Technology, 23.06.2019 10:00, lamanihill
Now, open this passage to read about fafsa requirements. describe the information you will need to provide in order to complete a fafsa. list at least three of the required documents you must include.
Answers: 3
Computers and Technology, 23.06.2019 14:00, savannnab1890
Select the correct answer. andre was recently hired by an organization to check for system vulnerabilities. he is supposed to exploit these vulnerabilities and create a report on the extent of damage to which the system was susceptible. what position does andre hold in this organization? a. information security analyst b. information assurance manager c. penetration tester d. network security engineer e. chief information security officer
Answers: 2
Three variables , x, y and z, supposedly hold strings of digits, suitable for converting to integers...
Geography, 30.07.2019 01:30
History, 30.07.2019 01:30
History, 30.07.2019 01:30
English, 30.07.2019 01:30
Mathematics, 30.07.2019 01:30