1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jlenok [28]
3 years ago
10

Write a loop to print 56 to 70 inclusive (this means it should include both the 56 and 70). The output should all be written out

on the same line.
Computers and Technology
1 answer:
IRINA_888 [86]3 years ago
4 0

Answer:

for i in range(56,71):

   print(i)

Explanation:

By the range 56 to 71 it means that for loop will run when i=56 to i=71, but the upper bound is one less than the upper bound, and which is 70. So the above loop will print integers from 56 to 70.

And the above code is in Python.

You might be interested in
Name two driving factors in the development of computers.
sertanlavr [38]

The two driving factors in the development of computers are the  Skill set of the team. [If the team is well versed in a specific stack, then the performance will be good as compared to any other stack].

<h3>What re the matters?</h3>

There are some matters to consider. For business programs, I'd say gaming. A lot of what the common laptop makes use of for enterprise doesn't require that kind of electricity.

  1. The skill set of the team. [If the team is well versed in a specific stack, then the performance will be good as compared to any other stack]
  2. Process familiarity. [If dev team knows the stack but the deployment/service team is new, then you may run into deployment and maintenance issues.]

Read more about the computers:

brainly.com/question/24540334

#SPJ1

8 0
2 years ago
Among the aforementioned parts, the FLASH DRIVE is the most common. Why do you think a flash drive will be essential for you as
zhuklara [117]

Answer:

They can be used to store homework, presentations, research, papers, essays and etc. They can be used to hand out homework assignments, course information or notes

4 0
3 years ago
Why does a HTML seen to work even when its broken? why does the code sometimes turn pink?
OverLord2011 [107]

the reason HTML seems to work even if it has syntax errors is due to browser having built in ways to parse the code meaning it will still show but most likely look way different then you would want.

the code may turn pink due to syntax errors

5 0
3 years ago
Four examples of computer virus​
Nikitich [7]

Virus that infects files. Macro Virus is a virus that attaches itself to an executable application. This type of virus is commonly found in Microsoft Word or Excel programs.... Browser Hijacker.... Web Scripting Virus.

Good morning, I hope this helps, and if you don't mind, please mark me as brainliest ❤

4 0
3 years ago
Of the listed principles, which process would transpire if a user provides a correct username and password?
kompoz [17]

Answer:

then the system will automatically grant access to that individual

Explanation:

Regardless of the system, a username and password are credentials used in order to prevent unauthorized access to the system. Therefore if a user provides the correct username and password when prompted, then the system will automatically grant access to that individual, since the account that they have logged in correctly as is already registered as an authorized account within the system.

5 0
3 years ago
Other questions:
  • Jason works as a financial investment advisor. He collects financial data from clients, processes the data online to calculate t
    9·1 answer
  • What is a critique of the feature detector model of object recognition?​?
    8·1 answer
  • An antonym for the word “help” which may be found in a dictionary is a. Assist c. Hold b. Abandon d. None of these
    13·2 answers
  • Which of the following is a feature of Big Data? Group of answer choices Its datasets are at least a petabyte in size. It is gen
    14·1 answer
  • What is the advantage of using standards to develop and implement protocols?
    10·1 answer
  • Use computer magazines and/or the internet to investigate one of these DBMSs: DB2, SQL Server, MySQL, Oracle, or Sybase. Prepare
    15·1 answer
  • When is a wrecker considered to be an emergency vehicle?
    12·1 answer
  • What is not true of credit scores?
    11·1 answer
  • Ashton assigned a string value to a variable. Which program statement should he use?
    5·1 answer
  • A _____ is a collection of (potentially) thousands of computers that can respond to requests over a network
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!