1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valina [46]
2 years ago
10

Write a Python program to do the following: (a)Use a for loop and a random integer generator to generate 5 random integers in 1

to 9. Store the random integers in a list. Display the list. (b)Use a for loop and a random integer generator to generate 5 random integers in 2 to 8. Store the random integers in a second list. Display the second list. (c)Use a for loop to compare elements in the two lists in pairs, i.e., compare the first elements in both lists, compare the second elements in the both lists, etc. Display the larger number in each comparison. The following is an example. There is no user input in this program.
Computers and Technology
1 answer:
Andrei [34K]2 years ago
6 0

Answer:

//program in Python

#library

import random

#part 1

#empty list 1

list1 = []  

#Generate 5 random numbers for the first list

for i in range(0, 5):

   list1.append(random.randrange(1, 9+1))

#print first list

print("First List: " + str(list1))

#part b

#empty list 2

list2 = []  

#Generate 5 random numbers for the second list

for i in range(0, 5):

   list2.append(random.randrange(2, 8+1))

 

#print the second list

print("Second List: " + str(list2))

#part c

#Compare each element from both  lists and print the larger one

print("Larger number in each comparison:")

for i in range(0, len(list1)):

   if list1[i] >= list2[i]:

       print(list1[i])

   else:

       print(list2[i])

Explanation:

Create an empty list.Generate 5 random number from range 1 to 9 and append them  into first list.Create a second empty list.generate 5 random numbers from range  1 to 8 and append them into second list.Print both the list.Then compare both the list an print Larger in each comparison.

Output:

First List: [3, 1, 4, 9, 8]                                                                                                

Second List: [5, 8, 2, 7, 6]                                                                                              

Larger number in each comparison:                                                                                          

5                                                                                                                          

8                                                                                                                          

4                                                                                                                          

9                                                                                                                          

8  

You might be interested in
Write a program. Commence the change to be dispensed from a vending machine. An item machine can cost between $0.25 send a dolla
SSSSS [86.1K]

Answer:

Explanation:

The objective of this question is to write a java program for a vending machine.

/* This program finds out what amount the vending machine is going to dispense. A given item in the machine can cost between $0.25 and a dollar in five-cent increments (25, 30, 35, 40...90, 95 or 100), and the machine accepts only a dollar bill to pay for the item. */

// Compile: javac PP10. java

// Run: java PP10

// imported the scanner class from util package.

import java. util. Scanner;

//class declaration

public class PP10 {

// main method is defined here.

       public static void main(String[]   args)

          {

// declaration of the variables.

             Scanner keyboard=new Scanner (System.in):

//taking the string type input

              int nl, amount, n2, n3, n4, n5;

            System.out.println("Enter price of item (from 20

cents to a dollar, in 5-cents) :");

             n1=keyboard. nextInt ();

            System.out.println("You bought an item for "+n1+"

cents and gave me a dollar");

            System.out.println ("so your change is ");

//the amount is first calculated.

          amount=100-n1;

// quarter value is calculated

            n2=amount/25;

// rest amount is get here.

            amount=amount%25;

// dime value is calculated

             n3-amount/10;

// rest amount is calculated

            amount=amount%10;

// value of nickel is calculated here

            n4=amount/5;

// rest amount is calculated

            amount=amount%5;

//at last the number of pennies is get

            n5=amount;

// Display output

              System. out . println(n2+" quarters") :

              System. out . println(n3+" dimes") ;

              System. out . println(n4+" nickels") ;

              System. out . println(n5+" pennies") ;

       }

  }

Output:

Enter the price of the item (from 20 cents to a dollar, in 5 - cents):

So, you bought an item for $0.45 and gave me one dollar; thus, your change is

2 quarters

0 dimes

1 nickel

0 pennies

4 0
3 years ago
Is a type of bullying that takes place when a person intentionally posts negative information about another that is not true
MakcuM [25]

Cyberbullying is bullying that takes place over digital devices like cell phones, ... posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else ... as well as any negative, mean, or hurtful content

6 0
3 years ago
Can someone help me with this project im confused
uysha [10]

u have to progrem a math algorithum

5 0
3 years ago
which process consists of one application program following a logical access path (lap) and then a dbms following a physical acc
laiz [17]

A DBMS acts as a conduit between the database and the applications that will use it, enabling users to access, modify, and control how the data is arranged and optimized.

Data points that are connected to one another are stored and accessible in a relational database, which is a form of database. The relational model, an easy-to-understand method of representing data in tables, is the foundation of relational databases. Data items are requested from the database by application programs, which are created using a combination of the DBMS's data manipulation language and a traditional programming language. The DBMS locates and provides the data elements requested by the application programs.

Learn more about database here-

brainly.com/question/6447559

#SPJ4

5 0
1 year ago
Type the correct answer in the box. Spell all words correctly.
ololo11 [35]

foud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsu

5 0
2 years ago
Other questions:
  • Samantha writes technical content for a webpage and uploads it to the webpage. What should she do to ensure that the content, wh
    11·2 answers
  • What is the output of the following Python program? try: fin = open('answer.txt') fin.write('Yes') except: print('No') print('Ma
    9·1 answer
  • Why should you log out when you finish an online session?
    9·1 answer
  • Most large organizations store data through a strategy called a(n) ________ to promote efficient and safe use of data across the
    11·1 answer
  • Subana is writing a program which will calculate the mean average of a set of numbers by adding the numbers and dividing the res
    11·2 answers
  • Data types influence the following in the workflow: (Select all that apply)a. the color choices and layout decisions around comp
    15·2 answers
  • For Windows 9x and Windows NT operating systems, which authentication protocol should be used that protects the authentication p
    11·1 answer
  • When an instrument in the dashboard of your car informs you the air pressure in the right rear tire is low, what type of compute
    14·1 answer
  • A(n) ____ investigation tracks all elements of an attack, including how the attack began, what intermediate devices were used du
    5·1 answer
  • To make changes to how UAC operates, you must be logged in as administrator true or false
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!