1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
never [62]
3 years ago
7

In python how do you write for prime factors

Computers and Technology
1 answer:
olasank [31]3 years ago
4 0

Answer:

The while loop is used and the factors of the integer are computed by using the modulus operator and checking if the remainder of the number divided by i is 0. 3. Then the factors of the integer are then again checked if the factor is prime or not.

Explanation:

google

You might be interested in
What is the name for the type of flash memory that is used by mobile devices to store their apps and data?
tankabanditka [31]
D. Solid state is correct
5 0
3 years ago
In response to an alert regarding a possible security incident, you are analyzing the logs for a web application. In the process
SOVA2 [1]

The type of attack was most likely attempted against the application is an  XSS attack.

<h3>Why is the above an  XSS attack?</h3>

This attack is known to be an example of an XSS attack as it is one that is often recorded by the log of a web server's log.

Conclusively, Note that in this attack, if you see the HTML encoding, one can say that is mainly an XSS attack but when you see SQL or XML statements in the string, then it is another.

Learn more about attack from

brainly.com/question/76529

#SPJ1

4 0
2 years ago
What is the financial aspect for a business as to what database software they will buy?
Masteriza [31]

Answer:  Database software is bought on basis of the processing, cost, requirement etc for any particular . According to the financial perspective the database  software should have the following characteristics:-

  • Database software that has most accurate and main feature according to the business requirement is selected for buying and the others with extra features are not considered as more feature cost more amount  which is not needed.
  • Database software which is still in progress to be built is pre-booked and money is invested on it because the price of the required software might increase after getting completed.
  • Scalable database software should be bought so that it can extend according to need at low cost.

 

8 0
4 years ago
Define the following Window class:
Olenka [21]

Answer:

The following Window class are given below:

class Window  // define a class Window

{

private:   //access modifier

int width, height;   // integer type variable which is width and height

public:   //access modifier

Window(int w,int h)   //constructor that accepts two integer parameters

{

 width = w;

  height = h;

}

friend bool areSameSize(Window a, Window b)

{

 if ((a.height == b.height) && (a.width == b.width))

  return true;

 else return false;

}

};

Explanation:

According to the question: Firstly we have define a class which name is 'Window' and then we take two integer type data member and after that we have constructor that takes two integer type parameters and after all we have a areSameSize, friend function, which can take two objects and then it give output in the form of true or false, if they are the equal size and finally we check that if the width and the height  match then it returns the true and else it returns the false

3 0
4 years ago
Is a mushroom a consumer or a producer or a decomposed
nydimaria [60]
<span>They are decomposers, they breakdown dead plants and animals and release</span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • The order in which statements are executed during a program run. Answer 1 The first part of a compound statement begins with a k
    12·1 answer
  • Plzzzzzzz help good answers only and best answer gets brainly
    5·1 answer
  • A(n) _____ is essentially a flash-based replacement for an internal hard drive.
    13·1 answer
  • A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate exec
    9·1 answer
  • Disadvantage do you think one can have if he or she does use electronic media
    15·1 answer
  • Exit windows entirely and turns off the computers power
    8·1 answer
  • Give fields descriptive so that you can easily identify them when you view or edit records.
    13·1 answer
  • Which of the following are the functions of an os?
    8·1 answer
  • Ask the user to type in an integer greater than 50 and assign it to a variable called x. Write a program to calculate the sum of
    12·1 answer
  • In 1956, the unit byte was coined by American statistician and computer scientist John Tukey
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!