1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rosijanka [135]
3 years ago
5

Num = int(input("Enter a number: "))

Computers and Technology
2 answers:
wel3 years ago
8 0

Answer:

26: B

3: C

48: E

Explanation:

num % 4 calculates the remainder after division. So the outcome can be 0, 1, 2 or 3. Note that you will thus never get D as an answer.

26 % 4 = 2 since 4*6+2 = 26. 2 maps to B.

48 is divisable by 4 so num is 0. However there is not test for that, so it falls to the last else case which prints E.

stellarik [79]3 years ago
7 0

Answer:

If the user enters 26 what is output?

B

If the user enters 3 what is output?

C

If the user enters 48 what is output?

E

Explanation:

The program in the question is written in Python 3. In Python, "%" is a modulus operator that will return the remainder value of a division. For example, if the user input 26, the 26 % 2 will be evaluated to 2 (remainder of 26/2) and the condition num == 2 will be true and therefore print B.

By using the same logical idea, we can predict when user enter 3, it will print C (remainder of 3 / 4 is 3).

When user enter 48, it will print E (remainder of 48 / 4 is 0). This is because none of the if and elif conditions are met and therefore the else block will run to print E.

You might be interested in
______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP
Kitty [74]

Answer:

"IP security" is the correct answer for the above question.

Explanation:

  • "IP security" is a set of rules or protocols which are used for the communication of the network.
  • It is a protocol that is used to encrypt the data which is needed to transfer on the network.
  • It provides security for the communication and it encrypts the data which is needs o transfer on the network.
  • The above question asked about the term which is used for encryption and security. So the answer is "IP security", which is defined above.
7 0
4 years ago
Read 2 more answers
What does the computer receive when you press a key on a laptop keyboard?
Anit [1.1K]

Answer:

a computer receives signal

6 0
3 years ago
Write a java method called vowelCount that accepts a String as a parameter and produces/returns an array of integers representin
VARVARA [1.3K]

Answer:AEIOU

Explanation:

7 0
3 years ago
What is the difference between a master device in a Bluetooth network and a base station in an 802.11 network?
spayn [35]

Answer:

In an 802.11, a master device in a bluetooth network organize themselves into a "Piconet" of up to 8 slave devices. In an 802.11, a base station is a receiver and transmitter that plays a role of the WIFI network.

Explanation:

802.11 is the original wireless specification and it was developed by IEEE. IEEE stands for Institute of Electrical and Electronic Engineers (IEEE).

In an 802.11, a master device in a bluetooth network organize themselves into a "Piconet" of up to 8 slave devices. In an 802.11, a base station is a receiver and transmitter that plays a role of the WIFI network.

7 0
3 years ago
What is The first letter o f each word in a secondary title
larisa86 [58]
What kind of title are you talking about? TRANSLATE THIS! "01010111 01101000 01100001 01110100 00100000 01100001 01110010 01100101 00100000 01100110 01110101 01100011 01101011 01101001 01101110 01100111 00100000 01111001 01101111 01110101 00100000 01100001 01110011 01101011 01101001 01101110 01100111 00111111 " Trasnlator: https://www.binarytranslator.com/


7 0
4 years ago
Other questions:
  • An essential skill today is knowing how to cite sources properly. Creative Commons has a system of licenses and tools for creato
    11·1 answer
  • Nine and 2 hundred thirty-five thousandths has a decimal
    5·2 answers
  • Program for bit stuffing...?
    9·1 answer
  • Cloud computing service providers manage different computing resources based on the services they offer. Which resources do IaaS
    10·1 answer
  • CODE EXAMPLE 3-1 SELECT vendorName, invoiceNumber, invoiceDate, invoiceTotal FROM vendors INNER JOIN invoices ON vendors .vendor
    13·1 answer
  • The dramatic increase in the number of people having access to the Internet has been made possible, in part, because of the rela
    8·1 answer
  • What is a systems development life cycle?
    5·1 answer
  • Marco had a database that showed the first, second, and third favorite ice cream flavors for each person in his school. He used
    11·2 answers
  • An administrator wants to configure hosts to automatically assign IPv6 addresses to themselves by the use of Router Advertisemen
    14·1 answer
  • What are some of the characteristics found in an editorial photograph?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!