1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksju [112]
4 years ago
15

Write a program using integers user_num and x as input, and output user_num divided by x three times. Ex: If the input is: 2000

2 Then the output is: 1000 500 250
Computers and Technology
1 answer:
tankabanditka [31]4 years ago
7 0

Answer:

The program written in Python is as follows:

<em>user_num = int(input("Number: ")) </em>

<em>x = int(input("x: ")) </em>

<em>for i in range(1,4): </em>

<em>      user_num = user_num/x </em>

<em>      print(user_num," ")</em>

Explanation:

This line gets user_input from the user

<em>user_num = int(input("Number: ")) </em>

<em />

This line gets x from the user

<em>x = int(input("x: ")) </em>

<em />

This line iterates from 1 to 3

<em>for i in range(1,4): </em>

This line divides user_num by x

<em>      user_num = user_num/x </em>

<em />

This line prints the result of the division

<em>      print(user_num," ")</em>

You might be interested in
What is spam? a type of virus that spreads from computer to computer through a network connection a type of virus that targets p
Bas_tet [7]

Answer:

This is a pretty obvious answer.

An unwanted e-mail sent in bulk from people or organizations.

Explanation:

8 0
3 years ago
What tasks do data entry macros commonly perform? Check all that apply.
Paha777 [63]

Answer:

test whether a user entered a value

3 0
3 years ago
BitLocker Encryption can be deployed three ways. Identify which of the descriptions best describes the Computer Authentication m
ch4aika [34]

To  know  the descriptions best term about the Computer Authentication method is that On the motherboard of many laptops is a chip known as the TPM (Trusted Platform Module) chip. The BitLocker encryption key can be found on the TPM chip (also called the startup key).

<h3>How can a computer be verified?</h3>

The user or machine must demonstrate their identity to the server or client during authentication. A user name and password are typically required for server authentication. Card-based authentication, retinal scanning, voice recognition, and fingerprint authentication are further options.

Therefore, Data theft or exposure from lost, stolen, or improperly retired computers is a hazard that is addressed by the OS system-integrated data protection feature BitLocker Drive Encryption.

Learn more about Computer Authentication method from

brainly.com/question/3522088
#SPJ1

3 0
1 year ago
For each of the following scenarios, write down what feature should be used in
inessss [21]

Answer:

d

Explanation:

5 0
3 years ago
1.A tachometer measures:
Art [367]
1. D


2. D


I hope I helped :)
3 0
3 years ago
Other questions:
  • Ted is a fashion designer. Where is he most likely to work
    9·1 answer
  • is family mobile and boost mobile the same? if not whats the difference? (btw this is a random question)
    12·2 answers
  • On a network, a(n) ________ helps prevent data packets from colliding with each other.
    9·1 answer
  • What are at least three differences between a personal and non-personal blog?
    5·1 answer
  • If a node receives a frame and the calculated CRC does not match the CRC in the FCS,
    12·1 answer
  • Question 10 of 10
    15·1 answer
  • Paula needs to ensure that an animation she has created is repeated. Which option should she use to achieve this?
    8·1 answer
  • PLSS HELP ASAP ILL GIVE BRAINLIEST THANKS
    15·2 answers
  • You work part-time at a computer repair store. You're building a new computer. The customer has requested two serial ATA (SATA)
    8·1 answer
  • Write and test a program that computes the area of a circle. This program should request a number representing a radius as input
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!