1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
worty [1.4K]
3 years ago
10

Use a while loop. Compare the digits; do not write a large if-else for all possible same-digit numbers (11, 22, 33, …, 88), as t

hat approach would be cumbersome for larger ranges.
Computers and Technology
1 answer:
pav-90 [236]3 years ago
5 0

Answer:

The solution code is written in Python 3:

  1. num = 11
  2. while(num <=88):
  3.    firstDigit = num // 10
  4.    secondDigit = num % 10
  5.    if(firstDigit == secondDigit):
  6.        print(num)
  7.        
  8.    num += 1

Explanation:

Firstly, create a variable, num, to hold the starting value, 11 (Line 1)

Create a while loop and set the loop condition to continue the loop while num smaller or equal to 88 (Line 3).

Within the loop, we can use // to perform the floor division and get the first digit of the num.  We use modulo operator % to get the second digit of the num. (Line 4 - 5)

If the firstDigit is equal to secondDigit, print the number (Line 7 -8). Lastly, increment the num by one and proceed to next iteration (Line 10).

You might be interested in
GAMER OYUNCU KOLTUĞU % YERLİ
rewona [7]

Answer:

what does that even say omg

3 0
4 years ago
Which form of investigation aims at checking whether or not a target system is subject to attack based on a database of tests, s
VikaD [51]

Answer:

<em>Empirical technical </em>research has a fundamental objective, which is to provide objective and independent information on the quality of the product to the interested party or stakeholder. It is one more activity in the quality control process.

Explanation:

Testing is basically a set of activities within software development. Depending on the type of tests, these activities may be implemented at any time during said development process. There are different software development models, as well as test models. Each one has a different level of involvement in development activities.

In a full penetration testing process, there are pre-instances to run this tool, but to take the first steps it is probably the best way to start. Nmap is a network scanning tool that allows you to identify what services are running on a remote device, as well as the identification of active computers, operating systems on the remote computer, existence of filters or firewalls, among others.

In simple words, when a server or device is going to be attacked, the attacker can carry out different attacks depending on the service: it is not the same to damage a web server, a database server or a perimeter router. Therefore, in any deployment, the first step will be to identify the services in the infrastructure, to decide how to proceed and, considering that in a penetration test the steps of an attacker are “imitated”, it will also be started in the same way.

5 0
4 years ago
How do media and networks interact
valkas [14]

Answer:

Media are connected to networks that make information easier to access and pass on.

7 0
4 years ago
TCP and the User Datagram Protocol (UDP) provide _________ between processes on any two of those hosts. A. address translation B
Fynjy0 [20]

TCP is known to be a type of a connection-oriented protocol, while UDP is a connectionless protocol. TCP and UDP provide data transport between hosts.

  • TCP and UDP are known for their speed, as TCP is slower and can retransmit lost data packets than UDP. UDP is said to be faster, simpler, and efficient protocol.

Data transport is simply known to be an the energy problem. It is the amount of energy needed to transport a bit from the closest neighbor.

Data Transport Service gives  a reliable connection for moving large amounts of data at very fast speeds.

Learn more from

brainly.com/question/17695822

6 0
3 years ago
According to the Doppler effect, objects moving away from Earth would have a
Stells [14]
<span>According to the Doppler effect, objects moving away from Earth would have a redshift.  </span>A <span> redshift means that every wavelength becomes longer and if we observe Hydrogen lines that are at a certain position, those will become redshifted.</span>
7 0
4 years ago
Read 2 more answers
Other questions:
  • Karen has opened a new business and is using Google Display Ads to build awareness of her new products. How does Google Display
    6·1 answer
  • Magnetic ram (mram) uses ____ rather than an electrical charge to store data.
    6·1 answer
  • nside of your organization that checks how often client machines access it. If a client machine hasn't accessed the server in th
    6·1 answer
  • 8) The higher the drag coefficient, the_____ the car will go<br> a)Siower<br> b)Faster
    9·2 answers
  • What is transaction model?
    9·2 answers
  • Which of the following best defines Monte Carlo simulation?a. It is a tool for building statistical models that characterize rel
    11·1 answer
  • One of the most common encryption protocols in use today. It is an asymmetric protocol that enables the sharing of a secret key
    7·1 answer
  • IT specialists must display technical expertise and collaborative proficiency in the workplace. Select the IT specialist who dem
    7·1 answer
  • how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local
    7·1 answer
  • Give an example where traditional laws and modern media have created "grey areas".
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!