1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kifflom [539]
2 years ago
5

How to add a while loop? here's my code

Computers and Technology
1 answer:
Jet001 [13]2 years ago
3 0

To add while loop in python language, the use of syntax is to be brought into the effect.

<h3>What is a while loop?</h3>

A while loop can be referred to as an expression of code-blocks being true to their cores. Until the blocks of the code are not proved to be true, the loop continues.

In order to add such while loop to your code, one needs to use the syntax function in python to prove the true and correctness of the code blocks.

Hence, the procedure to add while loop has been aforementioned.

Learn more about a while loop here:

brainly.com/question/15690925

#SPJ1

You might be interested in
Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k ti
grin007 [14]

Answer:

a; circuit-switched network.

b; No, it does not need congestion control.

Explanation:

For A;

A circuit-switched network is a better option for this application. This is because of the fact that the application is made up of long sessions with smooth data transfer capacity needs.

The transmission rate is known, and does not transmit in short intervals(short signals), every application session can have a bandwidth reserved without significant bandwidth wastage.

Also, the overhead expenses of setting up and tearing down connections are canceled out over the extensive period of running an application session.

For B;

If the packet-switched network is used, and traffic in the network comes from the said application. Even if every applications transmit one or more network connections. Still, we already know that every connection has enough transmission capacity to handle majority of the application data rates, no congestion(insignificant queuing) will happen.

This goes to say that no congestion control will be needed given such broad-based connection.

7 0
3 years ago
Electronic components in coputers process data using instructions, which are the steps that tell the computer how to perform a p
Dominik [7]

Answer:

True

Explanation:

  • True, the electronic components perform the tasks that are given to the computer.
  • The computer is made up of nothing but the electronic components like Transistors, Circuits etc.  
  • Electronic components are the building blocks of the computer.
  • So essentially all the tasks performed by the computer are actually performed by the electronic components inside it.
  • So it can be understood that the tasks that are given to the computer are performed by the electronic components. They perform the tasks with the instructions given to the computer.  
  • There also special electronic components designed to read, write and perform the tasks given to the computers.
  • The electronic components comprise of the circuits, transistors, resistors and capacitors.
3 0
3 years ago
Pathways in the Science, Technology, Engineering, &amp; Mathematics Career Cluster include:
ZanzabumX [31]

Answer: wanna say engineering technology and science and mathematics

Explanation:

7 0
3 years ago
A company has a popular gaming platform running on AWS. The application is sensitive to latency because latency can impact the u
AysviL [449]
Yetwywywywywywyyw would
8 0
3 years ago
Which activity is a case of identity theft
dezoksy [38]
<span>Criminal identity theft (posing as another person when apprehended for a crime)Financial identity theft (using another's identity to obtain credit, goods and services)Identity cloning (using another's information to assume his or her identity in daily life)Medical identity theft (using another's identity to obtain medical care or drugs)<span>Child identity theft]


cite: wikipedia</span></span>
4 0
3 years ago
Read 2 more answers
Other questions:
  • Viet drives around and checks meters to document the amount of electricity used in homes. What Energy pathway is he a part of? E
    9·2 answers
  • Which searching method requires that the list be sorted?
    5·1 answer
  • A hub or ____ is a central point that connects several devices in a network together.
    11·1 answer
  • Which item would you most likely keep in a database
    9·2 answers
  • The Springfork Amateur Golf Club has a tournament every weekend. The club president
    7·1 answer
  • Help me out with this .....
    10·1 answer
  • The __________ tag is used to create a forced line break without starting a new paragraph.
    13·1 answer
  • What is output?
    13·1 answer
  • Most C++ catastrophe vulnerabilities rely on uninitialized function pointers in a class.
    13·1 answer
  • Why When I change my pfp It be blurry and it be ugly- if you know what I mean :c
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!