1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
3 years ago
7

Plz help me of this answerlanguage:python​

Computers and Technology
2 answers:
lozanna [386]3 years ago
6 0

Answer:

The output of this code after execution is 2

Explanation:

In the code that is given in picture first of all variable 'x' is assigned to value 3 and then another variable  'num' is assigned to value 17. After the print statement is printing the value of 'num' modulus(%)  'x' which is 2. Modulus is mathematical operator which calculates the remainder value of euclidean division. Where 'num' is dividend and 'x' is divisor.  

enot [183]3 years ago
5 0

Answer:

output : 2

Explanation:

time: 0.16 exit

You might be interested in
Under what circumstances are composite primary keys appropriate?
guajiro [1.7K]
A composite primary key<span> is a set of several primary </span>keys<span> that, together, uniquely identifies each record.</span>
Primary keys are used as identifiers of composite entities. In this case each primary key combination is allowed only once in the *:* relationship.
Other case where primary keys are used is as identifiers of weak entities, where the weak entity has a strong identifying relationship with the parent entity. 
8 0
3 years ago
Paths describe the location of folders and files on your computer. If you have saved your work to c:\documents, then your work h
swat32
The answer is D and it can also be C
3 0
3 years ago
Follow me on Tik-Tok​
ivanzaharov [21]

Answer:

Sure

Explanation:

5 0
3 years ago
Read 2 more answers
What is contrast (in Photography)?
kozerog [31]

Answer:

Contrast is a tool that photographers use to direct viewers' attention to their subject. There are two types: Tonal Contrast and Color Contrast. TC refers to the difference in tones from the lightest tone to the darkest tone, in other words, the difference in tones from white to gray to black.

Explanation:

heheh there you go

3 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
Other questions:
  • What does iSCSI stand for?
    5·2 answers
  • What are some of the issues that organizations need to be aware of when designing and managing data?
    8·1 answer
  • to add data to to a chart, you must format data from another microsoft office product, that automatically opens. whats the name
    10·1 answer
  • Which of the following are benefits of designing a scalable system? Choose 3 options.
    15·1 answer
  • An mp3 takes up about 16 kilobytes of memory per second of music. if you owned a one terabyte hard drive and filled it with only
    15·1 answer
  • You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use?A. 255.25
    12·1 answer
  • The memory used by the CPU to temporarily hold data while processing is called _______. random access memory central processing
    5·1 answer
  • Which image file format is an uncompressed raster file which may contain different depths of color depths per pixel, or may be s
    5·1 answer
  • How do you modify WordArt? Give specific details and steps<br><br> NEED THIS ASAP
    9·1 answer
  • a functional policy declares an organization's management direction for security in such specific functional areas as email, rem
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!