1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kondaur [170]
4 years ago
9

This program will output a right triangle based on user specified height triangle_height and symbol triangle_char. (1) The given

program outputs a fixed-height triangle using a * character. Modify the given program to output a right triangle that instead uses the user-specified triangle_char character. (1 pt) (2) Modify the program to use a loop to output a right triangle of height triangle_height. The first line will have one user-specified character, such as % or *. Each subsequent line will have one additional user-specified character until the number in the triangle's base reaches triangle_height. Output a space after each user-specified character, including a line's last user-specified character. (2 pts)
Computers and Technology
1 answer:
Arturiano [62]4 years ago
4 0

Answer:

See explaination

Explanation:

triangle_char = input('Enter a character:\n')

triangle_height = int(input('Enter triangle height:\n'))

print('')

for i in range(triangle_height):

for j in range(i+1):

print(triangle_char, end = " ")

print()

You might be interested in
Which encryption standard uses Advanced Encryption Standard (AES), a 128-bit block cipher that is much tougher to crack than the
Alchen [17]

Answer:

Wi-Fi Protected Access 2 (WPA2)

Explanation:

The Wi-Fi Protected Access 2 (WPA2) makes some alterations to the encryption algorithm that were used in WPA and WEP to what is known as the  Advanced Encryption Standard (AES). This is a 128-bit block cipher considered to be much more difficult to crack than the usual 128-bit TKIP wrapper. However, although WPA2 offers a much more tougher encryption standard, it is important to note that it is not hack proof.

5 0
3 years ago
The CEO, calls you into her office and tells you that she's learned that the company needs a database to keep track of supplier
k0ka [10]
The database has been a very unique way to park in
7 0
2 years ago
HELP I am in the computer lab right now and I need legit reasons why i should work on a laptop instead of a computer. I dont lik
8_murik_8 [283]
Just be honest with your teacher. And say, "I'd rather work on my laptop, cause i feel uncomfortable on one of these computers." And you could say.. " I can save my work on here, so i dont lose anything if that computer messes up."
3 0
3 years ago
Read 2 more answers
Asking questions when something is unclear is part of
Ksenya-84 [330]
Personally responsibility

Hope this helps
6 0
3 years ago
In 5-10 sentences, describe the purposes, design considerations, and common elements of most brochures.
lozanna [386]
The primary thing to consider when designing a brochure is the target audience. <span> Brochures are meant to capture attention and deliver information, so it's important that the audience will want to read it in the first place.</span> When planning the design, consider the placement of elements and how they are arranged, or the 'white space'. Also take into consideration whether photos will be used. This ensures readability. <span>Also plan for the brochure's color scheme and fonts. These capture the audience so these are core parts of the design.</span>
4 0
3 years ago
Other questions:
  • Buildings must be wired to comply with the latest National Electrical Code to ensure that, with adequate maintenance, the instal
    11·1 answer
  • Ok, so this isn't a tech question it's about a game, moomoo.io so don't hate on this if you don't know it, 40 points to whoever
    12·2 answers
  • The programming interface between an application program and the dbms is usually provided by the
    13·1 answer
  • Molly, an end-user, connects an external monitor, external keyboard and mouse, and a wired network cable to her laptop while wor
    5·2 answers
  • The ____ aggregate function finds the largest value
    10·1 answer
  • Several new projects are being staffed by outside contractors who will be working on servers in the contractors’ office, not in
    5·2 answers
  • Match the ernerging technologies to their descriptions.
    14·1 answer
  • Check all that apply to Raster Graphics
    13·1 answer
  • How does a cell phone change the<br> incoming signals from a caller into sound that<br> you can hear
    10·2 answers
  • Database queries is an example of
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!