1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
noname [10]
2 years ago
13

given 2,4,3,-1 as input, what is the output for the following program:total_product = 1 user_value = int(input()) while user_val

ue > 0: total_product = total_product * user_value user_value = int(input()) print('Product:', total_product, end='')
Computers and Technology
1 answer:
AlekseyPX2 years ago
8 0

The python program for any of the given values is as written below.

<h3>How to run a Program in Python?</h3>

We are told to use input for the python program as;

2, 4, 3, -1

Now, the python program using 2 as user value and 1 as total product gives us the program as;

total_product = 1

user_value = (input(1)) #while user_value > 0:

total_product = total_product * user_value

user_value = (input(2))

print('Product:2', total_product, end='2')

Read more about Python Program at; brainly.com/question/26497128

#SPJ1

You might be interested in
A company wants to transmit data over the telephone, but they are concerned that their phones may be tapped. All of their data i
erastovalidia [21]

Answer:

def encrypt_digit(digit):

   if type(digit) is int or float:

       digit = str(digit)

   hold = list()

   for x in digit:

       d = str((int(x) + 3)%10)

       hold.append(d)

   first = hold.pop(0)

   second = hold.pop(0)

   third = hold.pop(0)

   fourth = hold.pop()

   print(int("".join([third,fourth, first, second])))

encrypt_digit(7836)

Explanation:

The python function accepts a four-digit parameter which represents the data transmitted over the company's telephone network. The function encrypts the data by adding 3 to each digit and getting the modulus of division 10, then the digits are swapped and printed out encrypted and ready for transmission.

6 0
3 years ago
Overcoming the fundamental attribution error requires making an effort to shift an external attribution into an internal attribu
Irina-Kira [14]

The correct answer on Edgen is:

(B.) False

I just took the test and this is the right answer.

8 0
4 years ago
Read 2 more answers
You work with alot of different documents in your internship with a software development company. What kinds of actions can you
Doss [256]

Answer:

Explanation:

Try as much as possible, to keep like files together in one folder. Even so there if you run into the hundreds or thousands, that is not going to be an easy thing do.

What ever you do, do clutter up your favorites bar, especially if your favorites spill over into where you have to push a button to get to them. Keep that bar open for what you really need on that bar. Mine has Brainly, Kitco, My Alberta Health, A graphing program, a second graphing program, Amazon, a scrabble word finder, and a couple of other things. It

If you can, try and keep your favorites to something that would be useless to anyone else. My favorites are worthless to anyone else. But I play a lot of scrabble related games.

7 0
2 years ago
Which success factor or reward of IS implementation enables you to see the real-time status or availability of a process or prod
trasher [3.6K]

Answer:

efficiency ( A )

Explanation:

Information systems ( IS ) implementation in business helps to create a competitive advantage for the business in the market where its products or services are sold .

A good/successful information system will be bring to light the real time status of a product by showcasing the products efficiency in real time to the potential/ returning customers who needs the product. showcasing the efficiency of a product over another similar products is a very good way to gain a very good advantage over other similar products.

The quality and productivity of the product cannot be affected  via the information systems. while the visibility of the product is done by the marketing department. the information systems give a real time detail of a product mentioning its composition and efficiency in real time.

7 0
4 years ago
What is indirect program memory addressing? Explain the working of the following instructions?
Elanso [62]
  • Indirect main memory addressing is described as the method in which the variable's address is stored in a mind register and also a command is utilized to point towards the memory registers which hold the register.
  • Instruction is used to direct towards a register that displays the results of the variables.
  • The register, in turn, refers to that variable's address in simplistic words. As just a result, it is indeed considered a passive program, memory address.

The instructions operate as follows:

a)

JMP AX :

  • The JMP instruction is being used to execute an unconditional jump.
  • AX is indeed the label's name.
  • JMP AX codes are being used to transfer control of the flow program to the AX label.

b)

JMP LIST:

  • The JMP command can be used to execute an unconditional jump, JMP LIST[DX] is the label's name.  
  • The JMP LIST[DX] program is being used to transfer control of its flow programs to the specified section.
  • It is the segment to which the flow control is transmitted.

c)

JMP NEAR PTR[DI+3]: 

  • Unconditional jumps could be done with the JMP command as you'll see, the label is JMP NEAR PTR[DI+3].
  • It's being used to transmit flow control to a particular section, throughout this case [DI+3].
  • The close keyword indicates that perhaps the code segment would be in the line of code being nearby.

Learn more:

brainly.com/question/20320915

4 0
3 years ago
Other questions:
  • Write a program that uses a two dimensional array to store the highest and lowest temperatures for each month of the calendar ye
    10·1 answer
  • Which of the following type of software is the most powerful for managing complex sets of data?
    6·2 answers
  • Where does the computer store instructions and data that are needed frequently by the cpu?
    11·1 answer
  • What does the regular expression [a-z0-9\-] mean?
    8·1 answer
  • Python
    14·1 answer
  • You have a network of ten computers connected to a single switch that has 12 ports. You need to add six more computers to the ne
    12·1 answer
  • The _______ of a secondary storage device indicates how much data the storage medium can hold.
    13·1 answer
  • Which of the following statements is true regarding Wireshark?
    11·1 answer
  • Complete the code to convert a float to a string. <br> answer=5.3 <br> strAnswer=__ (answer)
    12·2 answers
  • How many pixels are in a picture that is 640 pixels wide and 480 pixels high?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!