1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
m_a_m_a [10]
1 year ago
10

Need help with this coding question. It must be done in python and must use a while loop structure.

Computers and Technology
1 answer:
pogonyaev1 year ago
4 0

Answer:

I'm generally puzzled

Explanation:

You might be interested in
Jackson is teaching a class the concept of the binary number system. Which term will he use to refer to the leftmost bit of a bi
Fofino [41]
Most significant digit. That's the same that it's called for any number system.
5 0
3 years ago
Read 2 more answers
A typical setup for a ____ network would include computer users sharing a single internet connection.
konstantin123 [22]
Could be 'home or work' or intranet. Not enough context to answer any better.
3 0
4 years ago
Can you help me in my work
Ilia_Sergeevich [38]

Answer:

Step 1: harvest. First, you need to select the leaves for harvest. ...

Step 2: steaming. The next step is to heat the leaves by steaming them. ...

Step 3: shaping. ...

Step 4: oxidation. ...

Step 5: drying. ...

Step 6: enjoy your cup of home grown tea. ...

Step 7: storing leftover tea leaves.

5 0
2 years ago
Given a effective delay of 99ms when network usage is 74%, what is the effective delay when network usage = 84% ?
NARA [144]

148.5 ms is the effective delay when network usage = 84% .

<h3>what is a computer network?</h3>
  • A group of computers sharing resources that are available on or offered by network nodes is known as a computer network.
  • Over digital links, the computers communicate with one another using standard communication protocols.
  • These connections are made up of telecommunication network technologies, which are based on physically wired, optical, and wireless radio-frequency means and may be set up in a number of different network topologies.
  • Personal computers, servers, networking equipment, and other specialized or general-purpose hosts can all function as nodes in a computer network.
  • They can have hostnames and are identifiable by network addresses.
  • After being assigned, hostnames act as recognizable labels for the nodes and are seldom updated.
  • Network addresses are used by communication protocols like the Internet Protocol to locate and identify the nodes.

To learn more about the topic, refer to the following link

brainly.com/question/8118353

#SPJ4

3 0
2 years ago
Select the correct answer
Vaselesa [24]

Answer:

professional integrity

Explanation:

The work he is doing is comes under the violation of professional integrity. Because professional integrity is the set of ethics that should be followed by the employ. These ethics includes honesty, loyalty and dependability.

5 0
4 years ago
Other questions:
  • A program called the ______ combines the object program with other programs in the library and is used in the program to create
    5·1 answer
  • Select the correct answer. Which sentence best describe an effective management strategy? A. Conceal game-related clippings prio
    12·2 answers
  • True or False: Assuming that all variables are defined, the following segment of code is invalid. if ( x &gt; 0 )
    10·1 answer
  • Complete the statement pertaining to the number of frames used by the national television system committee. The national televis
    9·1 answer
  • 3 Points
    15·2 answers
  • Related to Image Classification
    13·1 answer
  • . Is it conceivable to design a secure operating system for these computer systems? Give arguments for and against.
    6·1 answer
  • List three ways you can help somone who is being cyber bullied instead of just being a bustander​
    7·2 answers
  • What term is used to refer to the requesting of information from a database?
    10·2 answers
  • How am I supposed to delete my Brainly account if I don't know my password and my E-mail is made up?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!