1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksian1 [2.3K]
3 years ago
12

Write a complete program to read two integers and display the number of integers that lie between them, including the integers t

hemselves. for example, four integers are between 3 and 6: 3, 4, 5, and 6.
Computers and Technology
1 answer:
Lyrx [107]3 years ago
6 0
#python:
min=input ("Gimmie an integer: ")
max=input ("Gimmie another integer: ")

for c in range(int(min), int(max) + 1):
    print (c, "", end="")
#in: 1 3
#out: 1 2 3
#I don't know pascal
// java
import java.util.Scanner;
class Program {
    public static void main ( String args[]) {
        Scanner input = new Scanner (System.in);
        int min = input.nextInt();
        int max = input.nextInt();
        
        for ( min, min <= max; min++) {
            System.out.print(min + " ");
        }
}// c++:
import <iostream>
int main() {
    for ( min, min <= max; min++) {
            cout<<min<<" "

        }
    return 0;
}
// ... I got bored
You might be interested in
The IV tubing and hub connection site should be left free of tape and uncovered from the dressing so that it can be visually ins
ra1l [238]

Answer:

True

Explanation:

Based on the information provided within the question it can be said that this statement is completely True. The IV tubing and hub need to be easily accessible and able to be visually inspected at all times since all liquids, including medicine enter the patients body through the IV line. Therefore any blockage or error can be life threatening and the problem in the tubing or hub need to be detected immediately and solved, which is why all IV equipment is transparent.

3 0
3 years ago
Complete the code to finish this program to analyze the inventory for a store that sells purses and backpacks.
suter [353]

Answer:

import <em>csv</em>

fileIn = open("data/bags.txt","r")

countPurse = 0

Explanation:

Edge 2021

4 0
3 years ago
Write a program that prints all the numbers from 0 to 6 except 3 and 6. Expected output: 0 1 2 4 5
stellarik [79]
<h2>Answer:</h2><h2></h2>

for x in range(7):

   if (x == 3 or x==6):

       continue

   print(x, end=' ')

print("\n")

<h2>Output:</h2>

>> 0 1 2 4 5

<h2>Explanation:</h2><h2></h2>

The code above has been written in Python. The following explains each line of the code.

<em>Line 1:</em> for x in range(7):

The built-in function <em>range(7)</em>  generates integers between 0 and 7. 0 is included but not 7. i.e 0 - 6.

The for loop then iterates over the sequence of number being generated by the range() function. At each iteration, the value of x equals the number at that iteration. i.e

For the first iteration, x = 0

For the second iteration, x = 1

For the third iteration, x = 2 and so on up to x = 6 (since the last number, 7, is not included).

<em>Line 2:</em> if (x == 3 or x == 6):

This line checks for the value of x at each iteration. if the value of x is 3 or 6, then the next line, line 3 is executed.

<em>Line 3:</em> continue

The <em>continue</em> keyword is used to skip an iteration in a loop. In other words, when the continue statement is encountered in a loop, the loop skips to the next iteration without executing expressions that follow the <em>continue</em> statement in that iteration. In this case, the <em>print(x, end=' ')  </em>in line 4 will not be executed when x is 3 or 6. That means 3 and 6 will not be printed.

<em>Line 4:</em> print(x, end=' ')

This line prints the value of x at each iteration(loop) and then followed by a single space. i.e 0 1 2 ... will be printed. Bear in mind that 3 and 6 will not be printed though.

<em>Line 5:</em> print("\n")

This line will be printed after the loop has finished execution. This line prints a new line character.

8 0
4 years ago
In the __________ phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the desi
mina [271]

In the Analysis phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the design of the security solution.

<h3>What is this stage about?</h3>

This is known to be the phases of development where there is  Analysis or one can say requirements gathering and where one has clearly set out problem or project as well as others.

Note that In the Analysis phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the design of the security solution.

Learn more about Analysis phase from

brainly.com/question/13897351

#SPJ1

5 0
2 years ago
Suppose Client X initiates a FTP session with Server W and requests data transferring. At about the same time, Client Y also ini
sergeinik [125]

Answer:

Folllows are the solution to the given points:

Explanation:

In this question, the server uses special port 21 and  20 for the command and data transfer. A customer uses a random short-term N > 1023 and N+1 ports Listen and the Ports may be randomly distributed and the following samples are given for:  

In point (a):

X: 1030 Client, W server: 21 (service)  

W: 20 server (data) ,Client X:1031

In point (b):

Server W: 21 (command) Client Y: 1035  

Client Y: 1036, (data) Server W: 20  

In point (c):

Client X: 1030, Server W: 21.  

Client X: 1031, (data) Server W: 20  

In point (d):

Client X: 1035, Server W: 21.  

Client X: 1036 ,(data): Server W: 20.  

In point (e):

Yes, it's an opportunity. It can be the same as a certain likelihood.  

In point (f):

The port of the server is the norm. If W and Y are on the same host, the client's port numbers can vary.  

4 0
4 years ago
Other questions:
  • Kylee needs to ensure that if a particular client sends her an email while she is on vacation, the email is forwarded to a
    10·1 answer
  • Choose the person responsible for each innovation.
    10·1 answer
  • Mutual authentication for multiple services is also known as _______.
    12·1 answer
  • How do you do these two questions? The first might have multiple answers and the second will have only one answer.
    14·1 answer
  • Who should be in charge of designing the database – team members, who understand the application requirements, or a database des
    11·1 answer
  • What is a cell in computers
    7·2 answers
  • Describe at least three virus scanning techniques
    13·1 answer
  • Wireless networks use radio frequency (RF) or radio techniques, which allows wireless transmissions to reach out in all directio
    6·1 answer
  • This is really not a question but yall should texts me I need friends:))
    9·2 answers
  • Who do we make games for?(single term)
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!