1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s344n2d4d5 [400]
4 years ago
10

Consider the following code: x = 17 y = 5 print (x % y) What is output?

Computers and Technology
1 answer:
Ierofanga [76]4 years ago
7 0

Answer:

The output to given python code is "2".

Explanation:

The description of the python program as follows:

  • In the given code, two variable is defined that is, x and y in which contain assign value that is 17 and 5.
  • In this code, variable x modules variable y that is (x%y). In python or any other programming language, modules (%) will give a remainder that is "2".
  • To print calculated value we use a print function, that prints its value.
You might be interested in
SYN scanning is a tactic that a malicious hacker (or cracker) can use to determine the state of a communications port without es
Mashutka [201]

Answer:

A closed port that can not receive request from authorized users.

Explanation:

Networks comprises of end devices, routing and switching devices, servers, technical control devices etc. The communication and interconnection of these devices makes up a secure and resourceful network.

Attackers can exploit loopholes in networks to steal information. The attackers uses the SYN scanning or cracking technique to implement the DOS or denial of service attack.

DOS is used to flood ports on a server in a network, preventing authorized user access, as they steal information to avoid detection.

8 0
4 years ago
Importance of word processing application​
alina1380 [7]

Answer:

Some of the functions of word processing software include: Creating, editing, saving and printing documents. Copying, pasting, moving and deleting text within a document. Formatting text, such as font type, bolding, underlining or italicizing.

Explanation:

8 0
4 years ago
Consider the efficiency of locating the kth element in a singly-linked list. How does that compare to locating the kth element i
eimsori [14]

Answer:

Finding kth element is more efficient in a doubly-linked list when compared to a singly-linked list

Explanation:

Assuming that  both lists have firs_t and last_ pointers.

For a singly-linked list ; when locating a kth element, you have iterate through a number of k-1 elements which means that locating an element will be done only in one ( 1 ) direction

For a Doubly-linked list : To locate the Kth element can be done from two ( directions ) i.e. if the Kth element can found either by traversing the number of elements before it or after it . This makes finding the Kth element faster because the shortest route can be taken.

<em>Finding kth element is more efficient in a doubly-linked list when compared to a singly-linked list </em>

4 0
3 years ago
Which of the following statements is true? The try block contains the code that handles the exception if one occurs. When a try
Elenna [48]

Answer:

You can have many catch blocks to handle different types of exceptions.

Explanation:

In programming, catch and try are blocks of codes that are written to handle errors. While the try block of code will allow for the definition of code blocks which are tested for errors, the catch block of code allows the programmer to define the block of code to be executed if an error occurs in the try block.... somewhat like the if....else statements. since there could be different error handling scenarios,one can have as many catch blocks for different error exceptions

8 0
3 years ago
What is a user data?
Rom4ik [11]

Answer:   Any data the user creates or owns.

Explanation:

the user being the one on the otherside of the computer, usually a human.

but examples of user data are intalled programs, uploads, word documents created by user (computer user)

7 0
3 years ago
Other questions:
  • The Glow effect adds a blinking border around a chart.<br> t or f
    15·1 answer
  • What is an ISP?<br> in computer Networking
    11·2 answers
  • How do you recognize the brand name of a drug in the package insert?
    15·1 answer
  • Which type of chart is used to chart progress over time?
    10·1 answer
  • Contains the instructions your computer or device needs to run programs and apps
    5·1 answer
  • Write a program to complete the task given below: Ask the user to enter any 2 numbers in between 1-10 and add both of them to an
    8·1 answer
  • People are still buying printed magazines?
    12·1 answer
  • 4. What are the ethical issues of using password cracker and recovery tools? Are there any limitations, policies, or regulations
    5·1 answer
  • What is the output of the following JavaScript code?
    9·1 answer
  • Which open-sourced packet capture tool uses linux and mac os x operating systems?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!