1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
TEA [102]
2 years ago
13

Write an algorithm to print the odd number from 100 to 1​

Computers and Technology
1 answer:
stiks02 [169]2 years ago
3 0

Answer:

In python:

for x in range(0,100):

   if x % 2 == 1:

       print(x)

You might be interested in
What is the solubility of an empty soda can
Leokris [45]

Answer:

Around 2.2 grams.

Explanation:

2.2 g CO2∗1 mol CO244 g CO2=0.05 mol

355 mL∗1 L1000 mL=0.355 L

So here we can see we have about 0.05 mol/0.355 L or about 0.14 mol of carbon dioxide per liter of soda. Of course this value varies by manufacturer, type of drink, container, etc.

5 0
4 years ago
How do you close a file?
natita [175]
You gave the answer in your question
8 0
3 years ago
Read 2 more answers
What are some characteristics of filtering junk email in Outlook 2016? Check all that apply.
Mashcka [7]

Answer:oof

Explanation:

4 0
3 years ago
Read 2 more answers
What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
ss7ja [257]

Answer:

Brute Force attack.

Explanation:

A network is a platform where end user devices like computers are connected to communicate and share resources. There are public networks and private networks.

A public network has its end devices and servers configured with a public IP address, which is routable on the internet, while private networks uses private IP addresses which can be used on the internet.

Private networks can be made accessable to public users by configuring an authentication and authorization policy, which could be one or a multi factor authentication. These requires a password and other factors to access the services of a private network.

An attacker can easily access a one factor or a password accessible user account, if the password is weak by using the process called a brute Force attack.

The brute Force attack exploits the vulnerability of weak passwords by entering possible valid combination from a defined set of possibilities.

6 0
4 years ago
PLZZ HELP
kap26 [50]

Answer:

Explanation:

Keep in mind a lossy algorithm will lose information while a lossless algorithm maintains all your original information.

Therefore:

A. False, a lossy algorithm will not allow perfect reconstruction.

B. True, if you don't care about keeping all your information it's easier to compress.

C. False, you can use a lossless algorithm for anything.

D. False, the point of lossless is that you keep all information.

4 0
3 years ago
Other questions:
  • Where can you change your web page SafeSearch settings?
    8·1 answer
  • Which of the following situations would not require knowledge of networking?
    6·1 answer
  • Which of the following would be a tradeoff of a scientific advancement that enables us to catch fish from the ocean faster than
    5·1 answer
  • How to select the entire table in microsoft excel
    11·1 answer
  • How can you tell that you're driving in the right direction?
    14·1 answer
  • In the code segment below, assume that the int variable n has been properly declared and initialized. The code segment is intend
    5·1 answer
  • Why are control components necessary in traditional software and generally not required in object-oriented software?​
    11·1 answer
  • Your friend has a great idea for a new app, and she shows you a document that outlines what the app will do. This document is an
    6·1 answer
  • Which of the following is typiacally the last step of the mail merge process
    11·1 answer
  • What are tasks performed by pascaline?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!