1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galina1969 [7]
4 years ago
15

Assume the list numbers1 has 100 elements, and numbers2 is an empty list. Write code that copies the values in numbers1 to numbe

rs2.
Computers and Technology
1 answer:
ollegr [7]4 years ago
8 0

Answer:

numbers1 = [5]*100

numbers2 = numbers1[:]

print(numbers2)

Explanation:

We have used the Python programming language to solve this problem. First we created a list to have 100 elements line 1, numbers1 = [5]*100, This statement creates a list that has 100 elements (the integer 5). In line two, we assign the elements in the the first list to the second list numbers2, notice the full colon in the statement numbers2 = numbers1[:], This allows the elements of the first list to be copied into the second list and on line 3, we printout the the second list.

You might be interested in
Refer to the exhibit. pc1 issues an arp request because it needs to send a packet to pc3. in this scenario, what will happen nex
Sauron [17]
RT1 will send an ARP answer with its own particular Fa0/0 MAC address.When a system gadget needs to speak with a gadget on another system, it communicates an ARP ask for requesting the default portal MAC address. The default portal (RT1) unicasts an ARP answer with the Fa0/0 MAC address.
5 0
4 years ago
Show the stack with all activation record instances, including static and dynamic chains, when execution reaches position 1 in t
astraxan [27]

Answer:

Activation Records

The storage (for formals, local variables, function results etc.) needed for execution of a

subprogram is organized as an activation record.

An Activation Record for “Simple” Subprograms

.

Activation Record for a Language with Stack-Dynamic Local Variables

Dynamic link: points to the top of an activation record of the caller

Explanation:

6 0
3 years ago
_________ was demilitarized by Germany because of the Treaty of Versailles. The Rhineland The North Sea The Ruhr Valley Eastern
Alchen [17]

The Rhineland was turned into a demilitarized zone because of the Versailles Treaty.   -From 1919, Germany wanted to get rid of this zone because it left them open to attack from Belgium, Holland and France.   In March 1936, Germany's army occupied the Rhineland.

8 0
3 years ago
Read 2 more answers
To write a letter using Word Online, which document layout should you choose? ASAP PLZ!
madreJ [45]

Traditional... See image below

8 0
4 years ago
Which of the following common software packages would help a business
Jobisdone [24]

Answer:

D. Spreadsheets

Explanation:

While A also seems correct, a spreadsheet is best at collecting and organizing data. Databases would only store data while a spreadsheet would keep those records, as well as help calculate a budget or payroll.

3 0
3 years ago
Other questions:
  • Gina is upgrading your computer with a new processor. She installs the processor into your motherboard and adds the cooling syst
    5·2 answers
  • What are some of the challenges that could arise from setting up a file management system on a computer?
    8·1 answer
  • Playstation network live updates pes 2018 does it cost extra
    13·1 answer
  • A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
    7·1 answer
  • How does a scriptwriter show the design team how different player actions should affect the game?
    6·1 answer
  • Create a CourseException class that extends Exception and whose constructor receives a String that holds a college course’s depa
    8·1 answer
  • // This program assigns values to two variables // and performs mathematical operations with them public class DebugFour1 { publ
    7·1 answer
  • Write a loop that finds the sum of the numbers between 7 and 34
    11·1 answer
  • 3. Comparing the Utopian and dystopian views of Technology according to Street (1992) which one in your view is more applicable
    9·1 answer
  • The Klez virus was a worm created to "spoof others. What is "spoofing"?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!