Can someone fix this code? I'm trying to run it in PYTHON and it won't work.
Thanks!
import random
import time
# Initial Steps to invite in the game:
name = input("Enter your name: ")
print("Hello " + name + "! Best of Luck!")
time.sleep(2)
print("The game is about to start!\n Let's play Hangman!")
time.sleep(3)
# The parameters we require to execute the game:
def main():
global count
global display
global word
global already_guessed
global length
global play_game
words_to_guess = ["january","border","image","film","promise","kids","lungs","doll","rhyme","damage"
,"plants"]
word = random.choice(words_to_guess)
length = len(word)
count = 0
display = '_' * length
already_guessed = []
play_game = ""
# A loop to re-execute the game when the first round ends:
def play_loop():
global play_game
play_game = input("Do You want to play again? y = yes, n = no \n")
while play_game not in ["y", "n","Y","N"]:
play_game = input("Do You want to play again? y = yes, n = no \n")
if play_game == "y":
main()
elif play_game == "n":
print("Thanks For Playing! We expect you back again!")
exit()

Answers

Answer 1

The given code is a Hangman game. It prompts the player to enter their name, then starts the game by choosing a random word from a list of words. The player is then asked if they want to play again.

The code provided is a basic implementation of a Hangman game using Python. Let's break down the code and understand how it works.

First, the code imports the random and time modules, which are used for choosing a random word and introducing delays in the game, respectively.

Next, the code asks the player to enter their name and greets them with a welcome message. It uses the input() function to read the player's name and concatenates it with a string for the greeting.

After a brief delay of 2 seconds using time.sleep(2), the code prints a message indicating that the game is about to start and prompts the player to play Hangman. Another delay of 3 seconds is introduced using time.sleep(3) to create a pause before starting the game.

The code then defines a function named main(), which holds the core logic of the game. Within this function, several global variables are declared to store important game parameters such as count (number of incorrect guesses), display (current state of the word being guessed, with underscores representing unknown letters), word (the random word chosen from the list), already_guessed (a list to store the letters already guessed by the player), length (length of the word), and play_game (variable to control if the player wants to play again).

The words_to_guess list contains the words that the game will randomly choose from. The random.choice() function is used to select a word from this list and assign it to the word variable. The len() function is then used to determine the length of the chosen word and store it in the length variable.

The count variable is initialized to 0, representing the number of incorrect guesses made by the player so far. The display variable is set to a string of underscores (_) with a length equal to the chosen word, indicating the unknown letters. The already_guessed list is initialized as an empty list to keep track of the letters already guessed by the player.

Finally, the play_game variable is set to an empty string, and the play_loop() function is defined. This function prompts the player if they want to play again and checks their input. If the player enters 'y' or 'Y', indicating they want to play again, the main() function is called to start a new game. If they enter 'n' or 'N', the game ends. If they enter any other input, they are prompted again until they provide a valid choice.

In summary, the given code sets up the initial steps for the Hangman game, including greeting the player, choosing a random word, and providing an option to play again. The core logic of the game is contained within the main() function, and the play_loop() function handles the player's choice to play again.

To learn more about Hangman

brainly.com/question/30761051

#SPJ11


Related Questions

Type the correct answer in each box. Spell all words correctly.
Which keys should you press to insert a comment?
You should press the + + keys to insert a comment.

Answers

Ctrl +Alt +N keys   keys should you press to insert a comment.

What is insert a comment?

Add a comment

Click at the end of the text or choose the text you wish to remark on.

Click New Comment under the Review tab.

Write a comment. Your comment is shown by Word as a bubble in the document's margin.

A comment is similar to a note written in the page margin of a document. To add recommendations, notes, or reminders to your papers, use Word's comments tool. Boxes on the side of the page contain comments.

Choose the text to which you wish to add a comment.

On the Review tab, click.

In the Comments group, select the New Comment option.

Using the document's right-click menu, choose New Comment.

Read more about insert a comment:

https://brainly.com/question/11521454

#SPJ1

Who can be permitted access to classified data?

Answers

Access to classified data is typically permitted to individuals who have undergone the necessary security clearance process, possess a valid need-to-know basis, and adhere to relevant security protocols. Security clearance levels, such as Confidential, Secret, and Top Secret, are established to protect sensitive information and ensure only authorized personnel gain access.

To be granted access to classified data, an individual usually undergoes a background investigation to assess their trustworthiness and eligibility. Factors considered in this process include criminal history, financial stability, and personal conduct. Once granted a security clearance, the individual must also demonstrate a genuine need-to-know for the specific classified information required for their job or assignment.

Access to classified data may be permitted to employees of government agencies, military personnel, government contractors, or other authorized individuals, depending on the nature and sensitivity of the data. These individuals are responsible for protecting the classified information and adhering to the security protocols that govern its handling, storage, and transmission. Unauthorized access or disclosure of classified data can have severe consequences, including criminal prosecution or damage to national security.

In summary, access to classified data is strictly controlled and permitted only to individuals with the appropriate security clearance, need-to-know basis, and compliance with established security procedures.

Learn more about Access  here:

https://brainly.com/question/31594216

#SPJ11

Need help with my hw.​

Need help with my hw.

Answers

If I am correct, it should be D. Hopefully I was helpful.
It is d I got it today

In three to five sentences, describe how you would move a slide from the end of the presentation to the second slide.

Answers

You just hold on the slide you want to move and move it to the second slide.

Answer:

Programs such as powerpoint help people to present topics in a clear, productive way. Other programs such as videos can be used to display information quickly and thoroughly while being enjoyed. Presentation technology is simple to use, so there is no high level of skill required to use the programs.

Explanation:

Where can I watch yarichin b club lol

Answers

i know an app but hwne i try to write it it says inapooripirate...

hhbbbdjwkwbfiefbwjfbejdb

Dawn is creating a photo calendar on her computer. Before she steps away from her computer to eat lunch, where should Dawn save her photos so she can come back and
continue working on the calendar?
O EEPROM
O Hard drive
O RAM
O ROM

Answers

Answer:

Hard drive

Explanation:

Dawn needs to save her photos on a storage device where she can easily retrieve her saved files after she finishes having her lunch.

From the list of given options, the option that answers the question is (b) the hard drive as it can be used as a medium to retain permanent data.

As for other options

(d) ROM can not be used as a direct storage device

(a) EEPROM is a type of ROM and

(c) RAM can not be used as a medium to store permanent data.

Answer:

hard drive

Explanation:

got 100

How can you tell if an email has an attachment? How do you download it? What folder does it download to?

Answers

Well the folder you get to pick on which one and it’ll basically have a this

PLEASE HELP
Which option is the correct format of placing HTML tags while coding in HTML?
A.
B.
C.
D.

Answers

Answer:

the 3rd one you put

Explanation:

For the situation below, determine whether the premium will likely increase, decrease, or remain the same.

Kamiah passes a driver’s education course.

Answers

Answer:

decrease

Explanation:

A(n) ______ is a tree in which each internal node has either two or three children, and all leaves are at the same level.

Answers

Answer: 2-3 tree

Explanation:

The smith family has five children who work in a variety of careers. they include a building designer, an astrophysicist, a computer programmer, a heating and ventilation expert, and an animal researcher. which career cluster do all these jobs belong to? science, technology, engineering, and mathematics science and mathematics engineering and technology research and experiments

Answers

The career cluster for the smith family is Science, Technology, Engineering and Math career cluster.

What are career clusters?

The career cluster is known to be a kind of set of  occupations that is said to have similar characteristics.

Conclusively, the jobs that are seen in the o same cluster do need a form of similar knowledge or skill type and thus the career cluster for the smith family is Science, Technology, Engineering and Math career cluster.

Learn more about children from

https://brainly.com/question/26423521

Answer:

A

Explanation:

AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA

Random.choice will choose a number between 1 and 100. True False​

Answers

Answer: False.

Explanation: Random.choice can choose between any 2 numbers.

Answer:

The person above me is right

Explanation:

Edge 2022

__________ refers to a variety of software applications that analyze an organization's raw data and obtain useful insights from it.

Answers

Business Intelligence or data analysis refers to a variety of software applications that analyze an organization's raw data and obtain useful insights from it.

Business intelligence (BI) is a data analysis is used by organizations to analyze data and hence gain insights on overall business performance so as to help the organization make good business decisions.

It helps organizations to increase revenue and efficiency thereby being more competitive than other business organizations.

Find out more at: https://brainly.com/question/15406226

Which of the following is NOT a method for applying the SDLC model?
ITIL
Lean
IPO
Agile

Answers

Answer:

IPO is not a mehod for applying the SDLC .

Question 2 (1 point)
The principle of design that relates to a harmonious arrangement of elements is
unity
pattern
balance
proportion

Answers

Answer:

The principle of design that relates to a harmonious arrangement of elements is "Unity".

William Shakespeare is credited for writing the five acts of Hamlet, Prince of Denmark. This play was published in 1630.

Answers

This assertion is untrue. Early in the 17th century, Shakespeare authored "Hamlet, Prince of Denmark," which was first printed in 1603 and 1623, not in 1630.

In 1603 who published Hamlet?

James Roberts added Hamlet to the Stationers' Register on July 26, 1602. In 1603 Valentine Simmes produced the first "bad" quarto for Nicholas Ling and John Trundell.

Who was King Hamlet's murderer?

Shakespeare's tragedy Hamlet1 recounts the following incidents: King Hamlet of Denmark dies unexpectedly and his brother Claudius a few weeks later marries the widow, his sister-in-law, Queen Gertrude; according to According to the official account, a snakebite caused his death.

To know more about Shakespeare visit:-

https://brainly.com/question/8912844

#SPJ1

What is the difference between the wiring configurations for a residential, 8-position, 8-contact (8P8C) modular plug and jack in the Universal Service Order Codes (USOC) and ANSI/TIA/EIA 570-B

Answers

The key variance between how the two wiring configurations described are in the way that the pair numbers three and four are situated or placed.

What is Service Order Codes (USOC)?

The above refers to a system of specifications that was created by Bell Systems company to enable the connection of equipment used in buildings both in homes and in public places.

The ANSI/TIA/EIA 570-B on the other hand is the standard that the cabling for telecommunications must meet.

Hence, the primary variance between how the configuration or settings of the wiring for a residential, 8-position, 8-contact (8P8C) modular plug and jack in the Universal Service Order Codes (USOC) and ANSI/TIA/EIA 570-B is in the way that the pair numbers three and four are situated or placed.

Learn more about wiring at:

https://brainly.com/question/25922783
#SPJ4

Checks or safety procedures are put in place to protect the integrity of the system is referred to as?

Answers

answer:

system controls

I’m confused what any of this means can anyone help?

Im confused what any of this means can anyone help?

Answers

The answer will be
97
98
96
194

Julie is purchasing new shoes on a website for her favorite store. Which of the following would indicate that a website is a secure site? http https www wwws

Answers

Answer:

https

Explanation:

looking at one right now tryna get me some shoes

Answer:

https

Explanation:

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

The data below represent the number of books read in the past year by a sample of five students.
1 5 5 15 38
The coefficient of variation for this sample is
Hint: Feel free to copy data over to Excel to answer this question.
89.62%
152.35%
25.68%
117.24%

Answers

The coefficient of variation for this sample is approximately 69.15%. None of the given options matches this value, so it seems there was an error in the provided answer choices.

To calculate the coefficient of variation for the given sample, we need to follow these steps:

Calculate the mean (average) of the sample.

Mean = (1 + 5 + 5 + 15 + 38) / 5 = 13.

Calculate the standard deviation of the sample.

Standard deviation = sqrt(((1 - 13)^2 + (5 - 13)^2 + (5 - 13)^2 + (15 - 13)^2 + (38 - 13)^2) / 5) = sqrt(402 / 5) ≈ 8.99.

Calculate the coefficient of variation.

Coefficient of Variation = (Standard deviation / Mean) * 100 = (8.99 / 13) * 100 ≈ 69.15%.

Know more about coefficient of variation here:

https://brainly.com/question/30783938

#SPJ11

for each of the following sources of information, identify whether they are analog or digital and explain why

Answers

Human voice is analog signal and computer key board is digital signal.

What are signals?

There are two different types of signals: analog and digital. Information is transferred between devices via signals. A continuous wave that continuously changes over time is an analog signal. The essence of a digital signal is discrete.

Information is sent using analog and digital signals, typically by electric signals. Information, including any audio or video, is converted into electric impulses in each of these systems. The way information is translated into electric pulses of variable amplitudes in analog technology differs from how it is translated into digital signals. Information is translated into binary format (zero or one) in digital technology, where each bit represents one of two different amplitudes.

To know more about Signals Visit:

https://brainly.com/question/29867764

#SPJ1

Q)for each of the following sources of information, identify whether they are analog or digital and explain why

1) human voice

2)computer keyboard

Where does the kinetic energy of a rotating coil motor come from?

Answers

Answer:

Hydraulic Motors and Rotary actuators

Explanation:

Hydraulic motors are powered by pressurized hydraulic fluid and transfer rotational kinetic energy to mechanical devices. Hydraulic motors, when powered by a mechanical source, can rotate in the reverse direction, and act as a pump.

Hydraulic rotary actuators use pressurized fluid to rotate mechanical components. The flow of fluid produces the rotation of moving components via a rack and pinion, cams, direct fluid pressure on rotary vanes, or other mechanical linkage. Hydraulic rotary actuators and pneumatic rotary actuators may have fixed or adjustable angular strokes, and can include such features as mechanical cushioning, closed-loop hydraulic dampening (oil), and magnetic features for reading by a switch.

Motor type is the most important consideration when looking for hydraulic motors. The choices include axial piston, radial piston, internal gear, external gear, and vane. An axial piston motor uses an axially mounted piston to generate mechanical energy. High-pressure flow into the motor forces the piston to move in the chamber, generating output torque. A radial-piston hydraulic motor uses pistons mounted radially about a central axis to generate energy. An alternate-form radial-piston motor uses multiple interconnected pistons, usually in a star pattern, to generate energy. Oil supply enters the piston chambers, moving each individual piston and generating torque. Multiple pistons increase the displacement per revolution through the motor, increasing the output torque. An internal gear motor uses internal gears to produce mechanical energy. Pressurized fluid turns the internal gears, producing output torque. An external gear motor uses externally mounted gears to produce mechanical energy. Pressurized fluid forces the external gears to turn, producing output torque. A vane motor uses a vane to generate mechanical energy. Pressurized fluid strikes the blades in the vane, causing it to rotate and produce output torque.

Additional operating specifications to consider include operating torque, pressure, speed, temperature, power, maximum fluid flow, maximum fluid viscosity, displacement per revolution, and motor weight. The operating torque is the torque that the motor is capable of delivering, which depends directly on the pressure of the working fluid delivered to the motor. The operating pressure is the pressure of the working fluid delivered to the hydraulic motor. The fluid is pressurized by an outside source before it is delivered to the motor. Working pressure affects operating torque, speed, flow, and horsepower of the motor. The operating speed is the speed at which the hydraulic motors’ moving parts rotate. Operating speed is expressed in terms of revolutions per minute or similar. The operating temperature is the fluid temperature range that the motor can accommodate. Minimum and maximum operating temperatures are dependent on the internal component materials of the motor, and can vary greatly between products. The power the motor is capable of delivering is dependent on the pressure and flow of the fluid through the motor. The maximum volumetric flow through the motor is expressed in terms of gallons per minute, or similar units. The maximum fluid viscosity the motor can accommodate is a measure of the fluid’s resistance to shear, and is measured in centipoise (cP), a common metric unit of dynamic viscosity equal to 0.01 poise or 1 mP. The dynamic viscosity of water at 20°C is about 1 cP (the correct unit is cP, but cPs and cPo are sometimes used). The fluid volume displaced per revolution of the motor is measured in cubic centimetres (cc) per revolution, or similar units. The weight of the motor is measured in pounds or similar units.

what is a security strategy that administers and enforces corporate epolicies for applications on mobile devices?

Answers

The security strategy that administers and enforces corporate e-policies for applications on mobile devices is known as mobile application management (MAM).

Mobile application management (MAM) is a security strategy that administers and enforces corporate e-policies for applications on mobile devices. MAM strategies secure, manage, and monitor both work and personal apps on an employee’s device. Mobile application management ensures corporate data security by enforcing data encryption, access restrictions, and remote wiping features on managed devices.

The MAM security strategy has a few key characteristics, including:Monitoring and tracking employee devices as they access company apps from personal devices, Integrating with existing enterprise mobility management (EMM) solutions to streamline mobile device management, and providing granular controls over app access, which allows IT managers to decide which apps can access corporate data.

More on mobile application management (MAM): https://brainly.com/question/29459063

#SPJ11

lfredo is on his way to the store and is repeating aloud the list of items he needs to get. Which method is he using to encode the information

Answers

Alfredo is using a method known as auditory encoding to remember the list of items he needs to get from the store.

Auditory encoding is a method of encoding information into memory by processing it as sound or through verbal repetition. In this case, Alfredo is repeating the list of items aloud, which engages his auditory senses and helps him remember the information more effectively. By vocalizing the items, he is creating an auditory representation of the list in his mind. This technique can be particularly useful for individuals who have a preference for auditory learning or find it easier to remember information when they hear it. By encoding the information through auditory repetition, Alfredo is enhancing his memory retrieval when he arrives at the store and needs to recall the items he needs to purchase.

Learn more about encoding here:

https://brainly.com/question/32271791

#SPJ11

What is the difference between weak AI and strong AI?

Answers

Explanation:Strong AI has a complex algorithm that helps it act in different situations, while all the actions in weak AIs are pre-programmed by a human. Strong AI-powered machines have a mind of their own. They can process and make independent decisions, while weak AI-based machines can only simulate human behavior.

How can technology help make roads safer?

Answers

Through these methods, we can technology to help make roads safer such as  As a result, automakers were equipping their vehicles with many era-enabled protection measures.

How has the era advanced vehicle protection?

Taking vehicle protection to the following stage. As a result, automakers were equipping their vehicles with many era-enabled protection measures. This consists of pre-collision help structures that use sensors and cameras to assist save you from an accident.

And there is. We have visible in NSW vast upgrades withinside the stage of avenue trauma during the last 30 years. From a height of 1,384 fatalities in 1978, with the bottom avenue toll in 2011 when you consider that 1926, of 364 fatalities.

Read more about the technology :

https://brainly.com/question/25110079

#SPJ1

Which of these jobs would be most appropriate for someone who majors in information systems? A. Managing a group of programers B. Creating a cloud based customer service application app C. Providing telephone tech support D. Designing a database for an online retailer.

Answers

Answer:

B. Creating a cloud based customer service application app

Explanation:

Information Systems is described as an "academic study of various systems encompassing a particular reference associated with the complementary networks and information of the software and hardware that different organizations and people use to collect, create, process, distribute, and filter data.

The information system includes an integrated pair of different components for storing, collecting, and processing data, along with this, it is utilized for providing knowledge, information, and digital products.

In the question above, the correct answer is option-B.

You're going to be mowing lawns as a summer job. How long will it take for your
hearing to be damaged without hearing protection?

1. Less than 15 mins

2. 1 hour

3. 4 hours

4. There is no hearing damage risk

Answers

hshshshhshshs 3. 4 hours

It would take 4 hours for your hearing to be damaged without hearing protection.

Personal protective equipment (PPE) are equipment worn to minimize exposure to hazards that cause serious workplace injuries and illnesses. Personal protective include items such as gloves, safety glasses and shoes, earplugs or muffs.

The sound of a lawn mower has a decibel level of 90dB. Hence, hearing begins to be damaged after 4 hours of exposure to this sound.

Find out more at: https://brainly.com/question/18003651

Other Questions
Please this is urgent I need help Show workings Select all the correct answers.If a figure is a square, its diagonals divide it into isosceles triangles.p: A figure is a square.q: A figure's diagonals divide into isosceles triangles.Which represents the converse of this statement? Is the converse true?000The converse of the statement is sometimes true and sometimes false.q+pThe converse of the statement is false.The converse of the statement is true.9-PP-9O ~p~9 Thesaying "Whoso is aman must be a nonconformist" is based on whose transcendentalist belief? ARalph Waldo EmersonB.Amos Bronson AlcottHenry David ThoreauMargaret Fuller Marlye posted a story on her blog. On the first day there were 80 responses and on the second day there were 180 responses. What percent is the increase, 100, of the original number of responses, 80?a. 55%b. 80%c. 100%d. 125% Which text best completes the sentence? ind the slope of each line.1) BRAINLIESTMichael was watching the rain hit the sidewalk in front of his house. After a few minutes, he noticed a change in the precipitation and saw that the precipitation had changed into ice pellets. The falling ice pellets later changed back to rain, and then the rain stopped and the sun came out. Relate each stage of the water to cycle to the way it affects the weather. [tex]solve \: this[/tex]..................... A history teacher asked her students how many hours of sleep they had the night before a test. The data below shows the number of hours the student slept and their score on the exam. What is the best linear regression model rounded to the nearest hundredth? image A. y = 6.38 x + 35.63 B. y = 6.37 x + 0.78 C. y = 35.60 x + 6.378 D. y = 35.63 x + 6.38 With __________, contributors organize online information regarding specific topics such as academic citations, wireless networks, books, and music. Weekly wages at a certain factory are normally distributed with a mean of $400 and a standard deviation of $50. Find the probability that a worker selected at random makes between $350 and $450 Happy Hound Pet Store sells dog food in 25-pound bags for $15.80. Pampered Pet Store sells dog food in 18-pound bags for $11.59. Which store has the cheaper price per pound?A) Pampered Pet Store, because it is 4.21 lower in price per bagB) Happy Hound Pet Store, because you get a bigger bagC) Pampered Pet Store, because it is a smaller bag for a lower priceD) Happy Hound Pet Store, because the price per pound is about $.01 per pound less than Pampered Pets Compute the average (mean) from the given information. Number of data values: 106 Sum of data values: 2,332Responses FILL IN THE BLANK isla is describing her dream to a friend. she explains that in her dream she being chased by zombies and she escaped them by hiding in a refrigerator. her description of her dream is focused on_________Content. you administer a netbios-based network that uses the tcp/ip protocol. you are trying to troubleshoot a computer that is unable to contact a server by its netbios name. which command can you use to check the connection? Based on these first steps of aggression, what lesson do you think the dictators learned about consequences of their actions?A.Democracies would stand up for the victims of attack.B.Their own people would protest such acts.C.Treaties could be ignored without penalty.D.Warfare was not worth the monetary or human cost. SO,b) What is the actual number of feet that is represented by 4 cm on a map?2 cm=5 ftISide 11 Sunita wants to cite two pieces of scholarship in the following sentence: Guided imagery was first used in the 1960s, in relation to aversive imagery, exposure, and imaginal flooding in behavior therapy. She needs to incorporate a book-length study by Achterberg published in 1985 and an article by Utay and Miller, published by 2006. How should she include these sources in this sentence using APA format?ResponsesGuided imagery was first used in the 1960s, in relation to aversive imagery, exposure, and imaginal flooding in behavior therapy (Achterberg et al., 1985).Guided imagery was first used in the 1960s, in relation to aversive imagery, exposure, and imaginal flooding in behavior therapy (Achterberg, 1985, Utay & Miller, 2006).Guided imagery was first used in the 1960s, in relation to aversive imagery, exposure, and imaginal flooding in behavior therapy (Achterberg, 1985; Utay & Miller, 2006). Ms. Parker wants to buy 10 books. Six of them cost $12.50 each, and the rest cost $26.35each. If she only has $150, how much more does Ms. Parker need to buy all 10 books? In a physics lab, light with a wavelength of 490 nm travels in air from a laser to a photocell in a time of 16.6 ns . When a slab of glass with a thickness of 0.890 m is placed in the light beam, with the beam incident along the normal to the parallel faces of the slab, it takes the light a time of 21.5 ns to travel from the laser to the photocell. Required:What is the wavelength of the light in the glass? Use 3.0010^8 m/s for the speed of light in a vacuum. Express your answer using two significant figures.