1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tangare [24]
4 years ago
10

Write a while loop that asks the user to enter two numbers. the numbers should be added and the sum displayed the loop should as

k the user if he or she wishes to perform the operation again.if so, the loop should repeat,otherwise it should terminate.
Computers and Technology
1 answer:
ikadub [295]4 years ago
6 0
Int repeat = 'y'
while repeat =='y' :
num1= int(input("Enter first number: "))
num2= int(input("Enter second number: "))
sum = num1+num2
print ("The sum is : "+str(sum))
repeat =int(input("Try another? (y/n) "))
You might be interested in
In 1971, Intel created and marketed the first microprocessor chip, called the Intel 4004. What was significant about this invent
PilotLPTM [1.2K]
The answer is D

<span>D) It allowed computers to be smaller because the chip allowed for the creation of computer components with varying capabilities.</span>
7 0
3 years ago
Which statement best describes a scientific theory?
lisov135 [29]

Answer:

It is supported by many different experiments.

Explanation:

Scientific theory is based on different experiments and tested in different situations and environment will all aspects. If the experiment finds true then observations will become theory. It can be changed in future if it does not meet the newly proposed conditions. But It does not means that, every theory can be changed.

6 0
3 years ago
________ is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Intern
pantera1 [17]

Answer:

The correct answer to the following question will be Option B (VPN concentrator).

Explanation:

  • Virtual Private Network (VPN) is a virtual, limited-use network generated using protocol encryption and tunneling over physical, public network connections.
  • A dedicated tool for managing VPN connections built over an untrusted network, such as the Internet, is called a VPN concentrator.
  • It's a type of networking system that ensures secure VPN connections are established and messages are transmitted between VPN nodes.

Therefore, Option B is the right answer.

7 0
3 years ago
In an LAN domain, _______________ is similar to a hub but can filter traffic, a ______________ connects LANs, or a LAN and a WAN
Alex17521 [72]

Answer: Switch, router, firewall

Explanation:

The function of the switch is to distribute the network to different networks similar in functioning to that of the hub but it performs filtering of the traffic present in the network using various traffic filtering algorithms.

The router whose main function is to route packets across the network is also used to connect between LANs and between LAN and a WAN.

The firewall is typically installed on systems or in servers or in routers with it most important function to filtering the traffic and minimize the packet delivery delay in LANs.

4 0
3 years ago
B. List any four major drawbacks of the first generation computer​
d1i1m1o1n [39]

Answer:

Terribly low storage space, limited to mathematics/computing, required entire rooms to use, and low information yield for hours of processing.

Explanation:

3 0
3 years ago
Other questions:
  • Hen pointing to a tool on the ribbon, a ______ appears, displaying information about the tool.
    7·1 answer
  • 13) What are the benefits and detriments of each of the following? Consider both the systems and the programmers’ levels. a. Sym
    14·1 answer
  • Define a function CoordTransform() that transforms the function's first two input parameters xVal and yVal into two output param
    12·1 answer
  • What coding language should i begin with if i'm looking to get into AI ?
    11·1 answer
  • Write a pseudocode algorithm which asks the user to enter a password.if the user enters “NotAtHome” then print “welcome”
    15·1 answer
  • At Tech Edge Inc., a special team is set up for making a robot capable of assisting blind people in daily activities. The member
    5·1 answer
  • A newly installed server communicates properly with its SCSI drives for six hours before requiring a reboot to continue communic
    11·1 answer
  • A small network used for communication between personal computing devices is known as?
    8·1 answer
  • Write function that ask for input from a user. Use this input as input for the countdown function that we wrote using the while
    6·1 answer
  • Ramesh goes to market for buying some fruits and vegetables .He
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!