1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karolina [17]
3 years ago
12

Create a program that can be used to add two integers together. In the beginning, the user is asked to give two integers that ar

e to be summed. The program then prints the formula that describes the addition of the numbers.
Computers and Technology
1 answer:
Gnesinka [82]3 years ago
3 0

Answer:

Answer written in python.

Explanation:

#ask user for the first integer.

first_number = int(input("enter first number: "))

#ask user for the second integer

second_number = int(input("enter second number: "))

#add both and store in a variable, result.

result = first_number + second_number

#print out the result

print ( f"the answer to the problem is {result} calculated by adding {first_number} to {second_number}")

The worded lines after the # sign are called comments and are used to describe what the following lines of code does making it easier to read and understand by other programmers or by the same programmer coming back to it after a while.

You might be interested in
The PictureBook class is a subclass of the Book class that has one additional attribute: a String variable named illustrator tha
bulgar [2K]

Answer:s

s

Explanation:

x

8 0
4 years ago
A "want" is very different than a "need'. What is a want?
Snowcat [4.5K]
I miss read the question the first time....the answer is C.
8 0
4 years ago
Read 2 more answers
You are implementing a new application control solution. Prior to enforcing your application whitelist, you want to monitor user
shepuryov [24]

Answer: Flag

Explanation:

When using an application control solution, it should be noted that the application whitelist is typically centrally defined which is applied to the network devices. In such case, the applications that are contained in the whitelist will be the only one that are allowed.

Therefore, the applications that are not contained in the whitelist should be flagged. This is necessary in order to effectively monitor the user traffic for a period of time in order to discover user behaviors.

5 0
3 years ago
A technician is tasked to implement a wireless router that will have the fastest data transfer speed at 5 GHz frequency. Which o
Basile [38]

Answer:

Option B i.e.,802.11ac is the correct option.

Explanation:

Because 802.11ac is that standard that is selected by the technician to install that router which is wireless and that router has the fastest speed of the data transfering that is 5GHz frequency. Mostly, the following standard is used in the large organizations by which the work done on time without any restriction to access the internet. So, that's why the following option is correct.

7 0
3 years ago
A binary search algorithm is written (as in the modules, for example) which searches a pre-sorted array for some user-defined va
Mazyrski [523]

Answer:

c) it will always return with an answer of 7 or fewer comparisons of data.

Explanation:

As maximum number of comparison in worst case for sorted binary search is log₂n, here n = 100, so maximum search is at least 6.6 which is approximately 7.

4 0
3 years ago
Other questions:
  • What are the 6 external parts of a computer system
    8·1 answer
  • In a clustered column chart, the names of each column are part of the ____ series. select one:
    14·2 answers
  • _____ consists of computer programs that govern the operation of a computer.
    12·1 answer
  • Consider the classes below:
    13·1 answer
  • Menus are attached to the windows by calling
    15·1 answer
  • State and give reason, if the following variables are valid/invalid:
    12·1 answer
  • Choose the assistive technology that best completes each sentence.
    13·1 answer
  • Which of the following bit value represent -5 in two's complement notation?
    5·1 answer
  • You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user. How can you best
    6·1 answer
  • WHERE DO I GO TO DO THIS AND WHAT DO I WRITE?????
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!