1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jok3333 [9.3K]
2 years ago
15

What is the output of this program? numA = 2 numB = 3 if numA == 2 or numB == 2: print("yes") elif numA == 2 and numB == 3: prin

t("no") Output:
Computers and Technology
1 answer:
Contact [7]2 years ago
5 0

Answer:

The outcome would be "yes".

Explenation:

numA = 2

numB = 3

if numA == 2 or numB == 2:

   print("yes")

elif numA == 2 and numB == 3:

   print("no")

<u>numA = 2</u>

This line of code declares the variable numA and gives it a value of 2

<u>numB = 3</u>

This line of code declares the variable numB and gives it a value of 3

<u>if numA == 2 or numB == 2:</u>

This part activate the next line of code only if the statement (numA == 2 or numB == 2<u>)</u> is True

   <u>print("yes")</u>

   This code prints out "yes" in the terminal.

<u>elif numA == 2 and numB == 3:</u>

This line of code is similar to the ifstatement above. The code below activates only if the statement (numA == 2 and numB == 3) is True and the previous ifstatement wasn't True.

   <u>print("no")</u>

   This code prints out "no" in the terminal.

You might be interested in
Which vendor certification would you think is the most relevant in the field of IT security? Why?
Travka [436]

Answer:

Certified Ethical Hacker

Explanation:

To maintain the confidentiality and integrity of the data , information, etc Information Technology security is of utmost importance thus preventing the harms and losses of an organization.

Certified Ethical hacker abbreviated as CEH is most relevant in the IT security sector.

EC- Council offered CEH, an intermediate level vendor certification, a must have for the security of IT organizations and the ethical hacking professionals.

It gives a demonstration of the information on assessing a system's security, vulnerabilities of a system,etc.

It became inevitable for the It sector as it faced breeches of security worldwide in the year 2018.

CEH credentials have sound knowledge and are skilled in hacking practices in the fields like firewalls, evading IDs, cryptography, Trojan, denial-of-service attacks, system hacking,etc

3 0
3 years ago
Because all the IEEE WLAN features are isolated in the PHY and ____________ layers, practically any LAN application will run on
Naddik [55]

Answer:

MAC

Explanation:

MAC Layer is the acronym for Media Access Control Layer. This said Media Access Control Layer happens to be one of the two sublayers that comprises of the Data Link Layer of the OSI model. The Media Access Control layer is majorly responsible or in charge of moving various data packets to the Network Interface Card, and also from the Network Interface Card (NIC) across a particular shared channel. The Media Access Control sublayer and the logical link control sublayer together are what makes up the data link layer.

3 0
3 years ago
What is Accenture's role in Multi-party Systems?
Maslowich

Answer:

helping a single company develop a data ingress platform

Explanation:

Accenture's role in Multi-party Systems is "helping a single company develop a data ingress platform."

This is evident in the fact that Accenture formed a strategic alliance with Marco Polo Network in recent times. The purpose of the alliance is to create a single data ingress platform for many connections. That is those on the network can easily install, either on-prem or through the cloud such as the Marco Polo platform, and then later incorporates the data into the enterprise resource planning system.

7 0
3 years ago
Why do I keep getting points if I haven't answered anything? I don't want points.
stepan [7]

Answer:

you get points for other things like logging on and asking questions

5 0
3 years ago
Hey does anyone know any sites like you tube i can watch on my school chrome book or tell me how to unblock sites cause everythi
Vera_Pavlovna [14]

Answer:

Simple

Explanation:

Phoenix browser

4 0
3 years ago
Other questions:
  • Hannah had been a newspaper carrier for four years. Each year she delivered more papers then the year before. The first year she
    13·1 answer
  • Are there any human lanaguages with context free grammar
    11·1 answer
  • ____ is the security guarantee that people who intercept messages cannot read them. A. Availability B. Encryption C. Confidentia
    9·1 answer
  • Studies show people remember at least ___more information when the document they are seeing or reading contains visual elements
    9·1 answer
  • Which of these is not the correct method for moving text in a document in Word 2016?
    7·1 answer
  • Why does a print document need a higher raster effect setting ?​
    14·1 answer
  • Suppose we want to design a combinational logic block that accepts a 4 bit Binary number as input. Let the most significant bit(
    14·1 answer
  • A pointer can be used as a function argument, giving the function access to the original argument.
    8·1 answer
  • SOMEONE HELP 60 POINTS!!!!! When creating business publications, these two factors must be determined before planning the layout
    8·2 answers
  • What is a good indicator that someone on social media is not who he or she claims to be?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!