1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ganezh [65]
1 year ago
5

Write a python program to check whether the number is divisible by 7. If its divisible, print its divisible otherwise find previ

ous number and the next number which is divisible by 7​
Computers and Technology
1 answer:
Stells [14]1 year ago
7 0

f = int(input("Enter a number: "))

if(f%7==0):

   print("It's divisible by 7.")

else:

   if(f<7):

       print("7")

   else:

       print(str(f-(f%7))+", "+str(f+(7-(f%7))))

You might be interested in
In the MOV instruction both operands i.e. source andthe destination cannot be
nekit [7.7K]

Answer:

an immediate.

Explanation:

It is because of the instruction encoding and decoding.Intel which make these instructions decided not include instructions which provide no real advantage. MOV segment register is one of them because segment register need not to be changed very often.This saves the space in instruction encoding.

3 0
3 years ago
Read 2 more answers
What does using indirect quotations allow a writer to do?
Marrrta [24]
Indirect quotations can add information that strengthens your content in many of the same ways as direct quotations so. Essentially, indirect quotes carry the meaning of a speaker or writer's original words without using the exact words.
7 0
3 years ago
Read 2 more answers
In learning information security, it is important to understand that threats to your company's information assets are present 24
coldgirl [10]

1. Acts of human error

<u>Explanation:</u>

Insecurity their are many threats that make a desktop or workstation or laptop.  Normally end users have to update operating systems and virus signature updates by periodic scheduling task moreover to avoid threats end-user also have to do periodic scheduling scanning. And the virus cleaning. Download the third-party malware and spyware and then the cleaning process.

End-users have made sure all required service is activated and running in the organization.

The team has to make sure any software threats are found in PC or workstation or laptop or desktop or LAN and try to remove make system up running without any threats.

8 0
3 years ago
Whats your favorite .io game (example krunker.io, gawd.io)<br> (PS FWEE PTS BOIS)
marshall27 [118]

Answer:

starve.io

Explanation:

It's basically an entire game, you can play a single run for hours and it's all new content the entire way, not to mention it's actually difficult the entire way through.

4 0
2 years ago
Choose the answer. Janice's IT department found that her computer had a program on it that was collecting her personal informati
harkovskaia [24]

Answer:

Spyware

Spam is just unwanted soliciation, spoofing is making links appear as something else, pharming is creating a fake website for victims to use.

7 0
2 years ago
Other questions:
  • Application partitioning gives developers the opportunity to write application code that can later be placed on either a client
    7·1 answer
  • Write a program that lets the user play the game of Rock, Paper, Scissors against the computer. The program should work as follo
    5·1 answer
  • Lisa wants to send an email with some confidential Information. Which of these options would work best for her?
    6·1 answer
  • Data means a group of numbers. <br> a. True<br> b. False
    7·1 answer
  • (70 points) This is a legit question that I have for a device FOR my homework.
    5·2 answers
  • Julie is purchasing new shoes on a website for her favorite store. Which of the following would indicate that a website is a sec
    6·1 answer
  • What would be the best tool to display the following information from a basketball game?
    6·1 answer
  • Xbox one is not turning on and power brick is orange why is that?​
    6·1 answer
  • What do we call the software which programmers use to program?​
    6·1 answer
  • scheduling is approximated by predicting the next CPU burst with an exponential average of the measured lengths of previous CPU
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!