1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lisa [10]
2 years ago
7

Given a list of integers. find the size of the list

Computers and Technology
1 answer:
dlinn [17]2 years ago
6 0

The size of a list of integers can be found using python as follows;

size = len(list1)

<h3>How to find the size of a list using python?</h3>

The size of a list can be found using the len() function in python.

According to the question, the list is an integer.

Therefore, let's use an example below:

list1 = [1, 2, 1, 3, 6, 7, 8, 9, 4, 7, 8, 6, 4]

size = len(list1)

print(size)

Therefore,  the size of a list of integers can be found using the len() function in python.

learn more on python here: brainly.com/question/14989942

#SPJ1

You might be interested in
An effective team would never have​
MA_775_DIABLO [31]

Answer:

problems or struggles

Explanation:

i believe this because with an effective team most problems aren't there and you can understand and work out problems or struggles

4 0
3 years ago
Please help with this:
Tanzania [10]

Answer:

I'm not gonna give you the answer. I want you to think about this what is math, what is science, how does it help the world, and etc. These are some example questions to help.

Explanation:

5 0
3 years ago
Where is the thesis statement usually located in research paper?
Ugo [173]
The thesis statement is typically located in the last sentence of the first paragraph of a research paper.
7 0
3 years ago
A document repository is down when you attempt to access it. which isa principle is being violated?
Tju [1.3M]
When a document repository is down when you attempt to access it, the ISA principle Authentication is being violated. The authentication method is done during the log on phase and is performed by the ISA server which requests certificate. <span>The client then needs to send the appropriate client certificate to the server in order to be authenticated and to have access to the document.</span>
3 0
3 years ago
Linda is training to become a certified network design expert and consultant. While researching about the process of cellular ra
mel-nik [20]

Answer:

a. The cell tower forwards the call to the wireless provider's Mobile Telephone Switching Office

Explanation:

When a cell phone user begins to make a call, it is picked up by the cell tower located in the cell in which the cell phone is located and that belongs to the user's wireless provider. The next step in this process is that the cell tower forwards the call to the wireless provider's Mobile Telephone Switching Office.

8 0
3 years ago
Other questions:
  • _______ computing refers to applications and services that run on a distributed network using virtualized resources.
    14·1 answer
  • What is the name of a popular high-level computer programming and scripting language that is the name of a snake?
    10·1 answer
  • Odbc works on the ____ operating system.
    5·1 answer
  • How did mark watney survive the accident
    9·1 answer
  • Sami is creating a web page for her dog walking business. Which item will set the theme for her page? Background color Heading c
    9·1 answer
  • Explain in your own words how remote-access Trojans (RATs) work. How can these be used by attackers? How would a network adminis
    10·1 answer
  • Pleasee help. How do you fix this problem in discord?
    10·1 answer
  • fun fact about London(me): when it comes to relationships she becomes clingy to the person shes dating
    10·1 answer
  • The four differences between binary and denary​
    13·1 answer
  • Which workbook view is used most often in Excel?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!