1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksano4ka [1.4K]
3 years ago
7

Problem 1: Create a list that contains the months of the year. Problem 2: Create a loop to print the month number and name (do n

ot hard code the month number)
Computers and Technology
1 answer:
mart [117]3 years ago
8 0

Answer:

Program for problem 1:

Month_name=['January', 'February', 'March', 'April', 'May', 'June', 'July', 'August', 'September', 'October', 'November', 'December'] # List which holds the month name.

Program for problem 2 :

Month_name=['January', 'February', 'March', 'April', 'May', 'June', 'July', 'August', 'September', 'October', 'November', 'December'] # List which holds the month name.

for x in range (0,12): # loop which is used to print the name and number of the month.

  print(str(x+1)+" "+Month_name[x]) # It will print the number and month name.

Output of problem 1:

The program for problem 1 has no output because it has no print statement.

Output of problem 2:

The above program will print all the months with their number in which the first text will print the number of the month and the second text will print the name of the month.

Explanation:

Missing information:

"Design the program for problem 1 and problem 2" is missing on the above question.

Detailed Explanation:

  • The above program is in python language in which the first line creates a list of the names of the months.
  • Then the "for loop" is used to print the number and name of the program.
  • In this "for loop", the list index is printed by adding 1 on it with the value which is the name of the month.
  • It is because the list starting index value is 0 and the ending index value is size-1.

You might be interested in
Select all that apply.
sergejj [24]
<span>Numbered lists should not be used
</span><span>Choose font colors that work well with your background.
</span>
5 0
4 years ago
Read 2 more answers
Which of the following statements is NOT true about a mainframe computer?
Savatey [412]

Answer:

C - A single computer with a single user is typical of a mainframe computer.

Explanation:

Mainframes are a type of computer that generally are known for their large size, amount of storage, processing power and high level of reliability. They are primarily used by large organizations for mission-critical applications requiring high volumes of data processing. In general, there are a few characteristics of mainframes that are common among all mainframe vendors: Nearly all mainframes have the ability to run (or host) multiple operating systems. Mainframes can add or hot swap system capacity without disruption. Mainframes are designed to handle very high volume input and output (I/O) and emphasize throughput computing. A single mainframe can replace dozens or even hundreds of smaller servers.

8 0
4 years ago
Generating a signature with RSA alone on a long message would be too slow (presumably using cipher block chaining). Suppose we c
boyakko [2]

Answer:

Following are the algorithm to this question:

Explanation:

In the RSA algorithm can be defined as follows:  

In this algorithm, we select two separate prime numbers that are the "P and Q", To protection purposes, both p and q combines are supposed to become dynamically chosen but must be similar in scale but 'unique in length' so render it easier to influence. Its value can be found by the main analysis effectively.  

Computing N = PQ.  

In this, N can be used for key pair, that is public and private together as the unit and the Length was its key length, normally is spoken bits. Measure,

\lambda (N) = \ lcm( \lambda  (P), \lambda (Q)) = \ lcm(P- 1, Q - 1)  where \lambda is the total function of Carmichaels. It is a privately held value. Selecting the integer E to be relatively prime from 1and gcd(E,  \lambda (N) ) = 1; that is E \ \ and  \ \ \lambda (N).  D was its complex number equivalent to E (modulo \lambda (N) ); that is d was its design multiplicative equivalent of E-1.  

It's more evident as a fix for d provided of DE ≡ 1 (modulo \lambda (N) ).E with an automatic warning latitude or little mass of bigging contribute most frequently to 216 + 1 = 65,537 more qualified encrypted data.

In some situations it's was shown that far lower E values (such as 3) are less stable.  

E is eligible as a supporter of the public key.  

D is retained as the personal supporter of its key.  

Its digital signature was its module N and the assistance for the community (or authentication). Its secret key includes that modulus N and coded (or decoding) sponsor D, that must be kept private. P, Q, and \lambda (N) will also be confined as they can be used in measuring D. The Euler totient operates \varphi (N) = (P-1)(Q - 1) however, could even, as mentioned throughout the initial RSA paper, have been used to compute the private exponent D rather than λ(N).

It applies because \varphi (N), which can always be split into  \lambda (N), and thus any D satisfying DE ≡ 1, it can also satisfy (mod  \lambda (N)). It works because \varphi (N), will always be divided by \varphi (N),. That d issue, in this case, measurement provides a result which is larger than necessary (i.e. D >   \lambda (N) ) for time - to - time). Many RSA frameworks assume notation are generated either by methodology, however, some concepts like fips, 186-4, may demand that D<   \lambda (N). if they use a private follower D, rather than by streamlined decoding method mostly based on a china rest theorem. Every sensitive "over-sized" exponential which does not cooperate may always be reduced to a shorter corresponding exponential by modulo  \lambda (N).

As there are common threads (P− 1) and (Q – 1) which are present throughout the N-1 = PQ-1 = (P -1)(Q - 1)+ (P-1) + (Q- 1)), it's also possible, if there are any, for all the common factors (P -1) \ \ \ and \ \ (Q - 1)to become very small, if necessary.  

Indication: Its original writers of RSA articles conduct their main age range by choosing E as a modular D-reverse (module \varphi (N)) multiplying. Because a low value (e.g. 65,537) is beneficial for E to improve the testing purpose, existing RSA implementation, such as PKCS#1, rather use E and compute D.

8 0
3 years ago
Which group on the home tab contains the line spacing attribute?
Juli2301 [7.4K]

Answer:

The Paragraph group on the Home tab contains commands to set and control several format options for a paragraph. The options include alignment, indentation, line spacing, and pagination. click Ctrl+J to justify. You can indent individual paragraphs so they appear to have different margins from the rest of a document.

Explanation:

comment an let me know how it helps

8 0
3 years ago
A classification system is different from a nomenclature in that it: Select one: a. is unique for the US while nomenclature is t
Yanka [14]

Answer:

<em>LETTER B . Refers to coding methods for diagnoses and procedures.</em>

Explanation:

<em>Because nomenclature is a recognized system of preferred terminology for naming disease processes. The nomenclature elimantes issues like diseases represent by more than one name or one name representing more than one disease.</em>

<em>The classification system codes methods for diagnoses and procedures. For instance, uses terminology code structure: system classification code, the body system affected by disease process.</em>

5 0
3 years ago
Other questions:
  • Which of the following sentences is written in the active voice
    12·2 answers
  • Ideally, how often should you back up the data on your computer? once an hour, once a day, once a month, once a year. Please hur
    5·2 answers
  • HELP QUICK!!!
    14·2 answers
  • 5255555555555+55555555555555/1111*99442
    14·2 answers
  • Which of the following aspects of a file can you NOT set by using the Save As dialog box?
    8·1 answer
  • What is the name of the popular DBMS (database management system) that is open source and is distributed under the General Publi
    15·1 answer
  • Joe wants to use pictures from the internet in a word processing program which is the most important aspect that Joel should con
    11·2 answers
  • Identify a characteristic of electronic meeting systems.
    10·1 answer
  • What do you need to do before you can sort and filter data in a database?
    9·1 answer
  • Hide Time Remaining A
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!