1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Feliz [49]
3 years ago
13

Rewrite following program using for loop no=3456 while no>0 : print(no%10) no=no/10

Computers and Technology
2 answers:
PtichkaEL [24]3 years ago
8 0

Answer:

no=3456  

for x in reversed(str(no)):

 print(x)

Explanation:

If you turn the number into a string and then reverse it, you can achieve the same output.

Ludmilka [50]3 years ago
7 0
No =3456
Your welcome I just took a test with this on it
You might be interested in
An assembly line is an example of which of the following facility layouts?
ikadub [295]

Answer:

Product layout

Explanation:

In configuration of facilities, the four layouts used are the process, product, cellular and fixed-position layouts.In process layout, operations that have similar functions are placed together. Example is a machine shop in manufacturing scenario.Product layouts are applied where there is repetitive assembly and processes.For example in flow shops where large volume of products are produced in a short time. Products that are very large or too heavy use fixed position layouts.Example is ship building or dam construction which require on-spot job performing.Cellular layouts is an equipment layout that will ease the process of cellular manufacturing.For example in group technology, parts of similar designed are identified to be grouped with processes that have similar characteristics to avoid re-arranging of layouts.

6 0
3 years ago
True or False? To use a C++ library function, you must use an #include directive to include the appropriate header file.
lakkis [162]

Answer:

True

Explanation:

While programming in most programming languages, one will have need to use functions and variables defined in other class libraries. in C++, these functions and variables' definitions are contained in Header files, which can be imported and used into any C++ program by using the pre-processor #include statement. This statement is the equivalent of import in java and copy in other languages. Popular header files are the Maths class (Allows use of maths functions like power, square roots exponentiation etc), the input/output (allows usage of cout print statement and cin input statement)

7 0
3 years ago
8. Which of the following is an output device
Fynjy0 [20]
<h2>Hey there!</h2>

<h3>Printer is an output device. </h3>

<h2>Explanation:</h2>

<h3>CD - We insert CD,so it is an input device.</h3>

<h3>Hard Drive - It is responsible for the memory of the computer, so it also an input device. </h3>

<h3>Joystick - It is used to play games on a computer, it inputs instructions through which a game/games can be played. So,it an input device.</h3>

<h3>Printer - It is used to print out the hard copies from a computer,like pages etc..</h3>

<h2>Hence, the correct option will be </h2>

<h3>D. printer </h3>

<h2>Hope it helps </h2>

7 0
2 years ago
MARK YOU THE BRAINLIEST!
AVprozaik [17]

1.) Over 3,000 corporations, charity groups, and government agencies reported data breaches. The majority of the accounts were exposed due to deliberate hacking, which accounted for 40% of the 5,000 occurrences.

2.) It drops By 20% within the 4 years. It goes at a steady pace then drops.

3.) It's a lot simpler. Everything, including databases, is now connected to the internet. This makes it much easier for anyone with the right skill set to access this data from anywhere in the world, with very little equipment or personnel, which is why data breaches caused by hackers are far more common than other types of incidents that would necessitate a lot more resources to access the same data.

4.) Another day, hackers claim responsibility for yet another big data leak. A hacker organization known as ShinyHunters said that it was auctioning 70 million sets of sensitive data reportedly obtained from AT&T only days after a breach at T-Mobile exposed roughly 53 million people's personal information. They are also interested in credit cards. If this trend continues, our social security and life will be jeopardized.

5.)Financial and payment systems have evolved over thousands of years, despite the fact that they are typically regarded of as new phenomenon. Over that time, the way transactions are carried out has changed dramatically, but the core goals have not. For instance, the economic tasks performed by Renaissance Italy's first modern banks are still relevant today.

Hope this helps took a while lol :)

4 0
2 years ago
Digital subscriber lines: are very-high-speed data lines typically leased from long-distance telephone companies. are assigned t
V125BC [204]

Answer: Operate over existing telephone lines to carry voice, data, and video.

Explanation:

Digital subscriber line is a means of transferring high bandwidth data over a telephone line. Such data could be a voice call, graphics or video conferencing. DSL uses a user's existing land lines in a subscriber's home, allowing users to talk on a telephone line while also being connected to the Internet. In most cases, the DSL speed is a function of the distance between a user and a central station. The closer the station, the better its connectivity.

5 0
4 years ago
Other questions:
  • The total cost of a DUI could be as high as----- dollars?<br> a100<br> b500<br> c1000<br> d8000
    15·2 answers
  • Your desktop computer monitor is not displaying a picture. What would you do to troubleshoot the problem?
    9·2 answers
  • Command icons under the following file tab in its function
    14·1 answer
  • A web application starts when a client sends _______ to a server?
    13·1 answer
  • What is the symbol for the relational operator 'equal to'?
    8·1 answer
  • Marie uses DHTML to create a website for her college. How is DHTML more helpful than HTML?
    13·2 answers
  • What is the correct order of the phases of the software development process?
    12·1 answer
  • PLEASE HELP
    7·2 answers
  • Which shooting games is good for low end PC. CSGO or Valorant?​
    11·1 answer
  • your organization has decided to use dhcp for ipv6. you want all windows 10 systems using ipv6 to get all of their tcp/ip inform
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!